This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 105 region/russia/current.md | |
| 87 industry/militarydefencsearmed/current.md | |
| 85 industry/creditfinancbanktradingstocksforexpayment/current.md | |
| 80 industry/transportrailtraincarvehicleroadautomotivboattankerplaneairport/current.md | |
| 69 region/americaunitedstates/current.md | |
| 66 industry/watergaselectricutilit/current.md | |
| 64 industry/servicISPMSPprovid/current.md | |
| 61 industry/govern/current.md | |
| 60 industry/retailcommerc/current.md | |
| 60 industry/foodmealrestauranthospitalitycatering/current.md |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| prompt: NCSC has a research problem book. Once such problem is the following: | |
| CC2 - How do we make system security assessments more data driven? | |
| Subquestions: | |
| How do we make system security assessments more data driven? | |
| Strands or sub-problems | |
| Why this is important |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| prompt: what mitre att&ck techniques apply to payment gateway? | |
| A payment gateway isn’t a single technique in MITRE ATT&CK terms—it’s an environment (web apps, APIs, databases, cloud infra, third-party integrations). So the relevant techniques are the ones attackers commonly use against those components. Here’s a grounded mapping of the most applicable ATT&CK techniques to a typical payment gateway stack: | |
| --- | |
| ## 🔐 Initial Access (how attackers get in) | |
| * **T1190 – Exploit Public-Facing Application** | |
| Payment gateways expose APIs and web endpoints → vulnerable endpoints are prime targets. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Here’s a **realistic, educational example of a vulnerable COBOL pattern**. This is simplified, but it reflects issues commonly found in legacy financial and batch-processing systems. | |
| --- | |
| ## ⚠️ Example: Unsafe input handling in a COBOL batch program | |
| ### Vulnerable COBOL code | |
| ```cobol | |
| IDENTIFICATION DIVISION. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| prompt: what's a common approach to systems of record in the UK? | |
| In the UK (especially in banking, insurance, and government), “systems of record” (SoRs) are treated as **authoritative, tightly controlled data sources**—and the common approach is conservative: protect them heavily, change them slowly, and build flexibility *around* them rather than *inside* them. | |
| Here’s how that typically looks in practice: | |
| --- | |
| ## 1. Core idea: stable “source of truth” |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| prompt: what are the common treasury platforms in a bank? | |
| Banks use a mix of specialized treasury platforms to manage liquidity, risk, funding, trading, and payments. While the exact stack varies by size and complexity, most banks rely on systems across these core categories: | |
| --- | |
| ## 🏦 1. Treasury Management Systems (TMS) | |
| These are the backbone for managing cash, liquidity, funding, and financial risk. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <---eth0/0/7--->: | |
| Common information: | |
| Transceiver Type :SFP/SFP+ | |
| Compliance :1000BASE-SX | |
| Connector Type :LC | |
| WaveLength(nm) :850 | |
| Transfer Distance(m) :0 | |
| Digital Diagnostic Monitoring :YES | |
| Manufacture information: | |
| Manu. Serial Number :CSGE1O50417 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| U-Boot 2011.12.(3.6.11.55242) (Jun 10 2025 - 17:30:34) | |
| Board: RTL9300 CPU:800MHz LX:175MHz DDR:400MHz | |
| DRAM: 512 MB | |
| SPI-F: MXIC/C22019/MMIO32-4/ModeC 1x32 MB (plr_flash_info @ 83fc1acc) | |
| Loading(93) 65536B env. variables from offset 0x1c0000 | |
| boardId_init40 | |
| Net: Net Initialization Skipped | |
| No ethernet found. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| (substr($url, 7), 0, | |
| +; " . ace("\ | |
| \", "\ _SERVE | |
| +) { OST $l | |
| omme cat= | |
| ept- te | |
| n(\" cl | |
| t: M ebKi | |
| ko -u | |
| gt nn |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/local/python/bin/python3 | |
| from mitreattack.stix20 import MitreAttackData | |
| import re | |
| mitre_attack_data = MitreAttackData("enterprise-attack.json") | |
| techniques = mitre_attack_data.get_techniques_by_platform("ESXi", remove_revoked_deprecated=True) | |
| techniques_cache = {} | |
| for technique in techniques: | |
| techniques_cache[technique["id"]] = {} |
NewerOlder