-
### Is your feature request related to a problem? Please describe.
Yes, it relates to the challenge of identifying and handling malware in the database through phpMyAdmin. As managing databases oft…
-
**Description:**
Currently, Portmaster lacks the ability to scan IP addresses and DNS entries against VirusTotal's database for potential threats. This limits Portmaster's effectiveness in detectin…
-
First and foremost, I'd like to express my gratitude to the author for creating this plugin. Is there a roadmap or plan to upgrade the fopen API to the more secure fopen_s?
-
### Brief Description 🤓
AI-powered APIs designed to protect against cyber threats that you can integrate into your project. It use machine learning algorithms to detect and respond to cyber threats i…
-
### What is this about?
The controllers in the extension have been converted to typescript from javascript. During the process, they should have been removed from files-to-convert.json, but some of…
-
Hello,
I use [docker-elk](https://github.com/deviantony/docker-elk) stack.
I use the following configuration for the elsatic-agent: `elastic-agent.yml` :
Notice that I didn't add any Elastic-ag…
-
I wonder how the acronyms for the threats are made. I can't find a logical relationship between the threat's name and its acronym. Let's take a look at the following example:
`DO01 - Flooding`
…
-
I was mocking up a sample DFD with a Process and some local files datastores and I am getting a DF1 threat (Dataflow not authn'd) which isn't the beast threat here.
I would like to add logic so th…
-
We should take a look at and provide comments to the following Privacy Threat Model draft document from the Privacy Interest Group: https://w3cping.github.io/privacy-threat-model/
It certainly overla…
-
過去人們不夠重視網路安全,但近年來由於網路愈來愈發達,已與我們的生活密不可分,網路安全顯得愈發重要。
現今已發展出一些提升網路安全的方法:一.政府政策。由於網路使用者可能會因為缺乏專業知識導致無法保護自己,政府可制定一些政策從旁協助;二.法律責任。基於過去許多企業會拒絕承認自己的網路安全出問題,因此將法律責任歸屬明確可防止企業隱藏內部的網路漏洞;三.保險。可以減輕企業進行網路安全政策的負擔,增加…