An actor, usually a person, who may attempt to exploit a vulnerability of an exposed system.
Questions tagged [threats]
99 questions
1
vote
0 answers
Do anti-cheat software actually "patch" the UEFI firmware on your motherboard?
I've recently read about the new game called Bloodhunt containing an Anti-Cheat, which had a bug, in which the anti-cheat service would stay installed even though the game is removed. The top Steam review called it out as Spyware and the review…
![](../../users/profiles/204820.webp)
Sir Muffington
- 1,447
- 2
- 9
- 22
1
vote
2 answers
Secure a virtual machine during a lab exercise
I recently started the Offensive Security AWAE course.
On their connectivity guide page, they warn about the hazards of connecting to their labs:
you will be exposing your computers' VPN IP to other students taking the course with you. Due to the…
![](../../users/profiles/148430.webp)
Martin Fürholz
- 795
- 9
- 21
1
vote
2 answers
How to respond to Indicators of Compromise?
We've received frequent emails from our Threat Intelligence Group with IoCs artifacts, such as file names, hashes, domains/urls. They request us to do preventive measures for the given attributes.
However, I find it very hard to follow their…
![](../../users/profiles/177686.webp)
sanba06c
- 103
- 9
1
vote
1 answer
Where do live threat maps get their threat-data from?
There are many "threat maps" online such as Norse, Fortinet etc serving accurate information of all kinds of attacks around the globe such as DOS, Scans, Pings, and many more.
How accurate is this
If i launched a big DDOS attack will this attack…
![](../../users/profiles/218543.webp)
Guest
- 11
- 2
1
vote
1 answer
What is the difference between Anti - APT (Advanced Persistent Threat) and ATP (Advanced Threat Protection)?
Like the question says, is it the naming difference only or are they entirely different?
![](../../users/profiles/9935.webp)
Regmi
- 115
- 6
1
vote
2 answers
Aren't VPN servers exposed to the same threats as public Wi-Fi?
Besides trust of the VPN provider, are VPN servers safe? Other people connect to it and it can be compromised, right? Is it the same threat as being connected to a public Wi-Fi where someone could performs a Man-in-the-Middle attack?
![](../../users/profiles/202090.webp)
Nicryc
- 121
- 3
1
vote
2 answers
Boot from live usb to avoid being spied on
Suppose the government wants to spy on you using government-designed malware. If you then want to visit sensitive pages on the internet, would it be more secure to use Tor browser within a USB - live boot environment (Ubuntu) as opposed to using…
![](../../users/profiles/138627.webp)
CuriousIndeed
- 161
- 1
- 10
1
vote
0 answers
Advice for carrying out risk identification in ISO27005:2011
I am currently required to carry out an information security risk assessment for an assignment, using the ISO 27005:2011 standard, for the Equifax data breach that occurred in 2017,…
![](../../users/profiles/192589.webp)
2nce
- 11
- 2
1
vote
1 answer
TVRA does it cover physical, cyber and information security?
For that matter is TVRA only linked to security?
Can it be used to assess, evaluate all or any situation and from there, come up with control measures?
![](../../users/profiles/188725.webp)
Jaya Anand V
- 11
- 1
1
vote
1 answer
Operation Prowli Malware Infects Over 40,000 Machines
Seems a new malware infection has been detected called 'Operation Prowli Malware' and around 40,000 machines are infected.
Still no CVE data updated on CVE site regarding the relevant vulnerability.
Anyone knows the impact and mitigation mechanism…
![](../../users/profiles/179495.webp)
Sayan
- 2,033
- 1
- 11
- 21
1
vote
1 answer
Relationship between threat analysis and attack modeling
What could be the Relationship between threat analysis and attack modeling.
Both are pretty close, have different perspectives but I need to know the relationships or in other words, how can they got integrated in an organization.
Update:
Here are…
![](../../users/profiles/135373.webp)
Mohammad
- 517
- 6
- 17
1
vote
1 answer
Spoofed number sending threats to students. Can it be traced to sender?
A SMS message was sent to several students at my son's school claiming to be my son stating that he was going to shoot up the school. My family didn't receive this message but I have the phone number it was sent from. I did a reverse lookup of the…
![](../../users/profiles/161361.webp)
user161361
- 11
- 1
1
vote
2 answers
Can a smartphone be hacked by calling it?
I have received call from international number (0012024558888). After receiving it I cut the call as it was irrelevant to me and I did not give any information to them. Now I doubt it as spam/scam call. My question is that can they hack personal…
![](../../users/profiles/134912.webp)
Amrutha
- 11
- 4
1
vote
3 answers
What would be the effects of a limited Russian/US cyber conflict be on cyber-security professionals?
In an interview with NPR's Steve Inskeep that is airing Friday on Morning Edition, Obama said, "I think there is no doubt that when any foreign government tries to impact the integrity of our elections ... we need to take action. And we will — at a…
![](../../users/profiles/70682.webp)
J Kimball
- 2,137
- 1
- 13
- 19
1
vote
1 answer
Threats due to a stolen password db file (e.g. keepass)
If someonelse could get your password db file (e.g. .kdbx file for keepass), maybe due to a hacking attack, how threaten is your security in fact?
Of course this is a problem and you should change all your passwords, but how "dangerous" is this…
![](../../users/profiles/129930.webp)
Artery
- 239
- 4
- 12