-
**Objective:**
The primary goal of this project is to develop a robust system for detecting cyber attacks using advanced machine learning techniques, including Logistic Regression, Multilayer Percep…
-
In today's digital age, cybersecurity plays a crucial role in safeguarding our online world. With the increasing reliance on digital information and systems, it is more important than ever to understa…
-
**Describe the bug**
Accessing a file under the /etc/pam.d directory via a symlink that doesn't include /etc/pam.d allows an attacker to evade detection by the standard ruleset.
**How to repro…
-
Hi,
Good job.
However,some descriptions of attack data are lacking.
Can you provide related details or share your Master's thesis?
Thank you.
-
## Feature Request
### Description of Problem:
We need to understand the value of the MITRE ATT&CK framework to justify its adoption within CCC as part of threat-informed assessments of cloud serv…
-
## Prerequisites
- [x] I read the [Deployment and Setup](https://docs.opencti.io/latest/deployment/overview/) section of the OpenCTI documentation as well as the [Troubleshooting](https://docs.open…
-
May I know the title of your paper work? I want to learn more details, Thanks very lot!
I'm also work in this area, and my work concentrates on the detection of PLC attacks, concluding scanning, mali…
-
# 💡 Summary #
Update https://docs.crossfeed.cyber.dhs.gov/
## Motivation and context ##
At this time, the xfd application does not allow custom scanning, but the platform will allow CyHy cust…
-
See file in below location:
assetutilities\src\assetutilities\tests\test_data\word_utilities
Search for text ex: "LNGC":
The output should be
3 times
1 : page 1, Section?
2: page 2, Section?…
-
- [ ] Come up with 5 most important tests to have in system by Tue EOD
- [ ] Reasoning why you are picking these 5 by Tue EOD
- [ ] Implemetation of these 5 actions by Wed EOD