Skip to content
#

threats

Here are 24 public repositories matching this topic...

colesmj
colesmj commented Oct 21, 2018

"AA03": { "description": "Weakness in SSO Authorization", "source": (Process, Element), "target": (Process, Server), "condition": "target.implementsAuthenticationScheme is False", },

What if the Process implements BasicAuth or uses mutual TLS (neither of which is SSO)?
If the Process uses SAML or OAuth, then maybe.
Maybe authenticationScheme as a string var is neces

Scenario: Working as a Security Engineer for X-CORP, supporting the SOC infrastructure. The SOC Analysts have noticed some discrepancies with alerting in the Kibana system and the manager has asked the Security Engineering team to investigate. Started with confirming that newly created Kibana alerts are working, after which monitored live traffic on the wire to detect any abnormalities that aren't reflected in the alerting system. Reported back all findings to both the SOC manager and the Engineering Manager with appropriate analysis.

  • Updated Jan 19, 2022

Mr Kyoashi is very famous man, he recently open new lab in spain , which can perform experiments on Quantum Physics, Computer. However yesterday, on conference he discuss about his achievement, that is Quantum Teleportation. QT open new areas in physics, perhaps it also allow new threats. One of the big, event happen on morning , somebody kidnapped Mr Kyoashi at his home.

  • Updated Dec 25, 2019
  • ASP

Improve this page

Add a description, image, and links to the threats topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the threats topic, visit your repo's landing page and select "manage topics."

Learn more