Questions tagged [threat-model]
11 questions
8
votes
3 answers
Bitdefender detects my console application as Gen:Variant.Ursu.56053
I've developed a console application that does a lot of routines, but the Antivirus detected it as a malware of type Gen:Variant.Ursu.56053.
How can I fix this without touching the antivirus policy because it's not allowed for us to create any…

Yaser
- 99
- 1
- 1
- 2
3
votes
5 answers
Threat model document
I am in the process of writing a threat model document for one of the applications which I am hosting.Its a Apache website which allows users to login, create their widgets by adding some best selling products etc. Can someone give me pointers on…

TopCoder
- 4,206
- 19
- 52
- 64
3
votes
2 answers
How to represent Azure Function in Microsoft threat modeling tool?
I am creating a data flow diagram for my application using Microsoft Threat Modeling tool. How can I represent Azure Functions as Azure template does not contain any element for that?

Vipul
- 1,563
- 4
- 22
- 46
2
votes
1 answer
Potential vulnerabilities in code generation tools
I'm working on building a code generation tool using JHipster. It gives promts on CLI through which customer can choose and then required Java package for CRUD layer of the micro service gets generated. The code generator in pipeline builds the…

AKSHAY JANGID
- 21
- 2
2
votes
1 answer
How to detect the presence of another app?
This is a theoretical situation:
I am writing an app to detect the presence of another on the phone
The classpath, name, Activity names etc. of the target app have been randomized, I can't just check if it's there (it is semantically the same but…

fredley
- 32,953
- 42
- 145
- 236
1
vote
1 answer
Automatically Generating Microsoft Threat Modeling Tool model
I have a context model in GraphML that I want to import into the Microsoft Threat Modeling Tool (MTMT).
After looking into the XML file used to represent the model it looks unreadable/hashed in some way.
I want to be able to generate a (generic)…

Thor
- 459
- 4
- 15
0
votes
0 answers
Why use a docker credentials store?
When using docker login it saves my credentials to ~/.docker/config.json as base64.
It also states that it's safer to use a credentials store and helper, because:
Using an external store is more secure than storing credentials in the Docker…

lonix
- 14,255
- 23
- 85
- 176
0
votes
0 answers
I'm currently try to develop the cyber attack map from MatthewClarkMay / geoip-attack-map, however this open source only show inbound
Is it possible to add outbound traffic from the current headquarters (main location) in map.js?
https://github.com/MatthewClarkMay/geoip-attack-map
I just want it to show like this
https://threatmap.checkpoint.com/
I want it to display both inbound…

John Steven
- 1
- 2
0
votes
2 answers
Getting error while running the configuring MSTICPY on Azure sentinel notebook
I am using Azure sentinel notebook for threat intelligence. While trying to configure msticpy for it to connect to Azure sentinel but getting 'Value error'. Following is the code that I am using :
from msticpy.config import MpConfigEdit
import…

Lopa
- 51
- 6
-1
votes
1 answer
Android studio java thread doesn't work properly
I have a switch button in my android application.
I make a thread which work is randomly flashing. I put a Start method when switch button is on and interrupt the method when the button is off. It works the first time but the second time when I…

anik
- 1
-2
votes
1 answer
Threat Risk Assessment
I have to do a Threat Risk Assessment for one of my customers. Can anyone please share some template or provide some pointers as to what all needs to be checked or audited for Threat Risk Assessment. Can be applicable to cloud as well as On-Prem…

Pallab
- 1,915
- 2
- 19
- 46