-
**Is your feature request related to a problem?**
Suricata is one of the largest open source IDS systems and is often used in combination with the ELK stack. It would be nice to be able to feed this …
-
While AWS GuardDuty has 116 finding types, the current Mitre TTP mapping only covers 68 of them.
To address this gap, I have created a spreadsheet for further analysis and welcome others to join and…
-
**[ UUID ]** 6120ad9e-6b26-4b1f-b64d-badba26bda19
**[ Submitter's Name ]** Tara Vancil
**[ Submitter's Affiliated Organisation ]** Blue Link Labs
**[ Submitter's Github ]** @taravancil
**[ Additiona…
-
### Support Questions
Hi,
We have our own MISP instance integrated with an external MISP instance for another organization. When we pull the events from this organization MISP, we are able to fe…
-
### Work environment
| Questions | Answers
|---------------------------|--------------------
| Type of issue | Bug
| OS version (server) | ubuntu
| OS version …
-
Game: https://vndb.org/v6918
Developer: C: drive.
Engine: ???
Extension: .xp3
Although the browsing directory can be opened, the files are encrypted. I have tried all the encryption options,…
-
**Is your enhancement request related to a problem? Please describe.**
When I'm watching a video on Invidious and want to share it with people who don't use Invidious, I typically just copy…
-
Have concern about how to best utilize Intrusions sets. Having Russian Cyber Threat LandScape as example, how can we categorize (GRU, SVR, FSB) in one hand and (APT28, APT829, Sandworm) on another han…
-
start with java web application by analyzing web.xml, bundled jars, etc.
-
### Work environment
Default Virtualbox image for version:
Currently installed version… v2.4.133 (b0a8f06a5f05606a60400550ce4ebccc6d0a2045)
### Expected behavior
When filtering on `timestamp`,…