Questions tagged [threats]

An actor, usually a person, who may attempt to exploit a vulnerability of an exposed system.

99 questions
0
votes
0 answers

What is cybersecurity landscape?

What does "cybersecurity landscape" mean? Is it a cyber threat trend?
0
votes
1 answer

What is the difference between "local" and "Adjacent" threat agents?

I am using CVSS to do the vulnerability assessment for my project. As per documentation here is the definition of local and adjacent Adjacent (A) The vulnerable component is bound to the network stack, but the attack is limited at the protocol…
kudlatiger
  • 149
  • 1
  • 8
0
votes
1 answer

Insider threats vs. insider attacks

I understand that a threat is a possible security violation that might exploit the vulnerability of a system, and a attack is an action on a system that harms the organisation in some way. Therefore, we should detect attacks and prevent or mitigate…
0
votes
0 answers

BLE IoT device as platform backdoor for hackers

I have a IoT device that works with BLE and uses a smartphone as a bridge to connect to a digital platform (cloud). The communication between the IoT device and the platform is based in PKI. The IoT device has only few privileges and services to…
LazyTurtle
  • 93
  • 5
0
votes
1 answer

DNS communicating with a remote host on an unusual server port 53

We have an Active Directory EC2 server on AWS US East region that has DNS enabled to resolve only internal hostnames. It is not reachable from any hosts on the public internet. Recently we enabled an AWS service called Guard Duty for threat…
Lego
  • 103
  • 2
0
votes
0 answers

Risk, threat, vulnerability with an example

Given a situation where a system has SSL 3.0 and TLS 1.0 enabled would the following mapping be accurate: Weakness/vulnerability: The remote service accepts connections encrypted using TLS 1.0 and SSL 3.0. Threat: An attacker can exploit these…
user211245
  • 79
  • 3
0
votes
2 answers

risk threat vulnerability

From ENISA - Threat and Risk Management Identification, analysis and evaluation of these threats and vulnerabilities are the only way to understand and measure the impact of the risk involved and hence to decide on the appropriate measures …
blabla_trace
  • 236
  • 1
  • 9
0
votes
2 answers

Why do unverified restaurants accounts pose a threat to the privacy and safety of users?

We have an app to order food from restaurants but the app developers decided not to verify any of the information provided by the restaurants like the location and opening hours. Why this decision might pose a threat to the privacy and safety of…
Memo
  • 9
  • 2
0
votes
3 answers

Is there any list of vulnerabilities and their signatures?

I am looking for a list of known vulnerabilities and their signatures. Is there any publicly available list of security vulnerabilities and their signatures? NVD (NATIONAL VULNERABILITY DATABASE) provides a database of known vulnerabilities, but…
0
votes
0 answers

Why would IPS vendor provider refuse to publish SLAs to fix the published highly ranked CVEs?

One of the biggest IPS providers (top of Gartner graph for its category) is not providing SLAs for all the 7+ ranking CVEs published last year. I don't really understand why would they refuse to provide SLAs for the published CVEs and I was…
Filipon
  • 1,204
  • 10
  • 22
0
votes
4 answers

Should the recent Tiny Chip attack teach us to invest less in our security posture?

Now with upcoming new year budgets to purchase the next tools and services for protecting our company to increase organization posture against cyber attack, I can't stop thinking if we should reduce all those budgets because there is no way to…
Filipon
  • 1,204
  • 10
  • 22
0
votes
2 answers

Are there any real instances of threats to machine learning systems?

I recently read a paper on The security of Machine Learning. Are there any instances of attacks against machine learning systems besides spam filters?
0
votes
2 answers

How much is known about who is responsible for all the database breaches?

Troy Hunt claims that those responsible for data breaches are often just teenagers and there are reports that a lot of the breaches would appear to come from insiders. But we also hear a lot about the extent and sophistication of cybercrime. Also,…
Peter Gregory
  • 139
  • 1
  • 2
  • 9
0
votes
2 answers

What should be people warned about?

I'm doing a presentation about security/privacy on web and i would appreciate few hints about what would you talk about. Just general, nothing IT specific. I just wanna give a 1000 foot view on few topics and go deeper if I see interest. People…
ShinobiUltra
  • 782
  • 7
  • 16
0
votes
1 answer

Threat modeling a network monitoring software

Assume a network fault monitoring tools is deployed to monitor a subset of routers. What an attacker can do by exploiting a network monitoring system like OpenNMS? Can they learn about the topology of the network? Can they find systems interest?…
user1493834
  • 177
  • 1
  • 10