-
**Describe the bug:**
- Number of TI indicators in overview card is different from the one in indicators page
**Initial setup:**
- To have filebeat data ingested with some of the TI modules enabled i…
-
https://socradar.io/free-isp-breach-compromises-millions-threat-actor-threatens-data-leak/
"Free, a leading French ISP and subsidiary of Iliad Group, confirmed a major data breach on October 26, 20…
-
## 📝 Scenario
This feature request outlines a set of security enhancements that can be implemented by the FinOps Toolkit team, along with actionable recommendations for customers to strengthen the s…
-
### Context
We want to identify assets with their corresponding data-flows.
### What needs to get done
1. Organize team brainstorming session.
2. In the Target of Evaluation doc fill the lists of…
-
### Proposal
Introduce support for creating threat modeling diagrams using Mermaid.js. Threat modeling is a critical process in cybersecurity, enabling architects, developers, and security profession…
-
### Context
We want to identify asset threats with their corresponding data flow threats.
### What needs to get done
1. Organize team brainstorming session.
2. In the Target of Evaluation doc fil…
-
I encountered a challenge in creating high-quality design documents for my threat modeling research. About a year and a half ago, I created AI Nutrition-Pro architecture and have been using it since t…
xvnpw updated
2 weeks ago
-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
-
# Authors
- @arber-salihi
- @ollol88
- @yilmi
# Summary
This RFC proposes the creation of a threat model to identify and analyze potential security risks across the AI supply chain. The goal …
-
https://www.cyberdaily.au/security/11286-350m-hot-topic-customers-have-data-allegedly-posted-online
"As discovered by Israeli cyber firm Hudson Rock, on 21 October, a threat actor going by the name…