-
### Pitch
As an admin, I want to be able to allow potential new users to see the instance block list, while hiding the list from scraper bots. Requiring a captcha to view the list (including disablin…
-
I am looking for a way to take a layer I have created for my detection coverage and highlight relevant techniques used by a specific threat group so that I can easily see what coverage I have in place…
-
[IdentityType](http://stixproject.github.io/data-model/1.2/stixCommon/IdentityType/) has a field for `Related_Identities` but it's not clear what that means in the context of any specific identity usa…
-
https://www.marketing-interactive.com/omnicom-media-group-reportedly-falls-prey-to-cyber-attack
-
To add an account, the following statement occurs and nothing happens.
```
2024/07/19 15:03:34 device.go:214: There doesn't seem to be an Authy account attached to that phone number
```
-
Good day SRA!
I would like to share a feature request in Vectr, based on a recent idea that we've started using outside of vectr.
**Context:** Vectr is a great tool for priorization and vulgariz…
-
```
python3 file2txt.py \
--mode html_article \
--file tests/files/html-real/unit42-Fighting-Ursa-Luring-Targets-With-Car-for-Sale.html \
--output examples/unit42-Fighting-Ursa-Luring-Target…
-
## Description
This rule detects the use of the SSH_AUTH_SOCK environment variable in a process command-line to hijack a user's existing SSH session in order to move laterally without requiring the…
-
In #43 I give many examples of deployments of vast meshes of passive Bluetooth antennas, providing easier means of re-identification than relayed in the security analysis.
The deployment of those …
-
https://www.myhighplains.com/news/local-news/betenbough-homes-targeted-by-ransomware-attack/