-
Be great if this repo also contained a bunch of examples of different Azure scenarios to help with how to create a threat model. For example there's a template for a VPN Gateway and one for MFA but c…
-
**Is your feature improvement request related to a problem? Please describe.**
Assess the threat model for the thing-edge. Mainly for the `child` devices.
STRIDE model of threats for the communicati…
-
I have 2 smartphones that have identified Revanced Updater as malware or infected app.
### Threats:
Virus name: APK:RepMalware [Trj]||arep
Danger level: High
-
**Issue by [cibotalista](https://github.com/cibotalista)**
_Friday Jul 19, 2019 at 06:41 GMT_
_Originally opened as https://github.com/CJB-Geneve/com-botalista-backend/issues/1988_
----
Url : https…
-
```
Hi,
please find the attached small patch that addresses the follow issues:
- Fix for fragmented read.
Current version threats the response always as an array. That is not the case
when you are …
-
```
Hi,
please find the attached small patch that addresses the follow issues:
- Fix for fragmented read.
Current version threats the response always as an array. That is not the case
when you are …
-
Section 2: Not all data centers environments have all the risks/threats highlighted in this document. In certain data center environments operated by a cloud provider or a private enterprise, where ce…
-
```
What steps will reproduce the problem?
1. gem install origami
2. virus scanner reports Exploit:Win32/Pdfjsc.Q
3.
What is the expected output? What do you see instead?
I expect to install the gem …
-
Today, devices may be compatible with multiple IoT platforms (e.g. a lightbulb may work with Amazon Alexa, Google Home, Apple HomeKit, and its own Zygbee backed application). The WoT Primary Stakehol…
-
|Wazuh version| Component | Action type |
|---| --- | --- |
| 4.3.5-x | Rules | Error |
## Description
Rule 91801 currently has a single if_sid value of 60000.
Depending on the severity leve…