Questions tagged [threats]

An actor, usually a person, who may attempt to exploit a vulnerability of an exposed system.

99 questions
1
vote
0 answers

Do anti-cheat software actually "patch" the UEFI firmware on your motherboard?

I've recently read about the new game called Bloodhunt containing an Anti-Cheat, which had a bug, in which the anti-cheat service would stay installed even though the game is removed. The top Steam review called it out as Spyware and the review…
Sir Muffington
  • 1,447
  • 2
  • 9
  • 22
1
vote
2 answers

Secure a virtual machine during a lab exercise

I recently started the Offensive Security AWAE course. On their connectivity guide page, they warn about the hazards of connecting to their labs: you will be exposing your computers' VPN IP to other students taking the course with you. Due to the…
Martin Fürholz
  • 795
  • 9
  • 21
1
vote
2 answers

How to respond to Indicators of Compromise?

We've received frequent emails from our Threat Intelligence Group with IoCs artifacts, such as file names, hashes, domains/urls. They request us to do preventive measures for the given attributes. However, I find it very hard to follow their…
sanba06c
  • 103
  • 9
1
vote
1 answer

Where do live threat maps get their threat-data from?

There are many "threat maps" online such as Norse, Fortinet etc serving accurate information of all kinds of attacks around the globe such as DOS, Scans, Pings, and many more. How accurate is this If i launched a big DDOS attack will this attack…
Guest
  • 11
  • 2
1
vote
1 answer

What is the difference between Anti - APT (Advanced Persistent Threat) and ATP (Advanced Threat Protection)?

Like the question says, is it the naming difference only or are they entirely different?
Regmi
  • 115
  • 6
1
vote
2 answers

Aren't VPN servers exposed to the same threats as public Wi-Fi?

Besides trust of the VPN provider, are VPN servers safe? Other people connect to it and it can be compromised, right? Is it the same threat as being connected to a public Wi-Fi where someone could performs a Man-in-the-Middle attack?
Nicryc
  • 121
  • 3
1
vote
2 answers

Boot from live usb to avoid being spied on

Suppose the government wants to spy on you using government-designed malware. If you then want to visit sensitive pages on the internet, would it be more secure to use Tor browser within a USB - live boot environment (Ubuntu) as opposed to using…
CuriousIndeed
  • 161
  • 1
  • 10
1
vote
0 answers

Advice for carrying out risk identification in ISO27005:2011

I am currently required to carry out an information security risk assessment for an assignment, using the ISO 27005:2011 standard, for the Equifax data breach that occurred in 2017,…
2nce
  • 11
  • 2
1
vote
1 answer

TVRA does it cover physical, cyber and information security?

For that matter is TVRA only linked to security? Can it be used to assess, evaluate all or any situation and from there, come up with control measures?
1
vote
1 answer

Operation Prowli Malware Infects Over 40,000 Machines

Seems a new malware infection has been detected called 'Operation Prowli Malware' and around 40,000 machines are infected. Still no CVE data updated on CVE site regarding the relevant vulnerability. Anyone knows the impact and mitigation mechanism…
Sayan
  • 2,033
  • 1
  • 11
  • 21
1
vote
1 answer

Relationship between threat analysis and attack modeling

What could be the Relationship between threat analysis and attack modeling. Both are pretty close, have different perspectives but I need to know the relationships or in other words, how can they got integrated in an organization. Update: Here are…
Mohammad
  • 517
  • 6
  • 17
1
vote
1 answer

Spoofed number sending threats to students. Can it be traced to sender?

A SMS message was sent to several students at my son's school claiming to be my son stating that he was going to shoot up the school. My family didn't receive this message but I have the phone number it was sent from. I did a reverse lookup of the…
user161361
  • 11
  • 1
1
vote
2 answers

Can a smartphone be hacked by calling it?

I have received call from international number (0012024558888). After receiving it I cut the call as it was irrelevant to me and I did not give any information to them. Now I doubt it as spam/scam call. My question is that can they hack personal…
Amrutha
  • 11
  • 4
1
vote
3 answers

What would be the effects of a limited Russian/US cyber conflict be on cyber-security professionals?

In an interview with NPR's Steve Inskeep that is airing Friday on Morning Edition, Obama said, "I think there is no doubt that when any foreign government tries to impact the integrity of our elections ... we need to take action. And we will — at a…
J Kimball
  • 2,137
  • 1
  • 13
  • 19
1
vote
1 answer

Threats due to a stolen password db file (e.g. keepass)

If someonelse could get your password db file (e.g. .kdbx file for keepass), maybe due to a hacking attack, how threaten is your security in fact? Of course this is a problem and you should change all your passwords, but how "dangerous" is this…
Artery
  • 239
  • 4
  • 12