From 9f73ff73ac5dc0cee2c08703c564571e14d9f5b4 Mon Sep 17 00:00:00 2001 From: Christophe Vandeplas Date: Tue, 21 Feb 2023 10:54:30 +0800 Subject: [PATCH] fix: [first-dns] corrected typo --- clusters/first-dns.json | 2 +- galaxies/first-dns.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/clusters/first-dns.json b/clusters/first-dns.json index 641a4ca..423d972 100644 --- a/clusters/first-dns.json +++ b/clusters/first-dns.json @@ -22,7 +22,7 @@ "Trey Darley (FIRST board; founding member)" ], "category": "first-dns", - "description": "The Domain Name System (DNS) is a critical part of the Internet, including mapping domain names to IP addresses. Malicious threat actors use domain names, their corresponding technical resources, and other parts of the DNS infrastructure, including its protocols, for their malicious cyber operations. CERTs are confronted with reported DNS abuse on a continuous basis, and rely heavily on DNS analysis and infrastructure to protect their constituencies. Understanding the international customary norms applicable for detecting and mitigating DNS abuse from the perspective of the global incident response community is critical for the open Internet’s stability, security and resiliency. See also https://www.first.org/global/sigs/dns/ for Tmore information.", + "description": "The Domain Name System (DNS) is a critical part of the Internet, including mapping domain names to IP addresses. Malicious threat actors use domain names, their corresponding technical resources, and other parts of the DNS infrastructure, including its protocols, for their malicious cyber operations. CERTs are confronted with reported DNS abuse on a continuous basis, and rely heavily on DNS analysis and infrastructure to protect their constituencies. Understanding the international customary norms applicable for detecting and mitigating DNS abuse from the perspective of the global incident response community is critical for the open Internet’s stability, security and resiliency. See also https://www.first.org/global/sigs/dns/ for more information.", "name": "FIRST DNS Abuse Techniques Matrix", "source": "https://www.first.org/global/sigs/dns/", "type": "first-dns", diff --git a/galaxies/first-dns.json b/galaxies/first-dns.json index d830f21..e7ed7d9 100644 --- a/galaxies/first-dns.json +++ b/galaxies/first-dns.json @@ -1,5 +1,5 @@ { - "description": "The Domain Name System (DNS) is a critical part of the Internet, including mapping domain names to IP addresses. Malicious threat actors use domain names, their corresponding technical resources, and other parts of the DNS infrastructure, including its protocols, for their malicious cyber operations. CERTs are confronted with reported DNS abuse on a continuous basis, and rely heavily on DNS analysis and infrastructure to protect their constituencies. Understanding the international customary norms applicable for detecting and mitigating DNS abuse from the perspective of the global incident response community is critical for the open Internet’s stability, security and resiliency. See also https://www.first.org/global/sigs/dns/ for Tmore information.", + "description": "The Domain Name System (DNS) is a critical part of the Internet, including mapping domain names to IP addresses. Malicious threat actors use domain names, their corresponding technical resources, and other parts of the DNS infrastructure, including its protocols, for their malicious cyber operations. CERTs are confronted with reported DNS abuse on a continuous basis, and rely heavily on DNS analysis and infrastructure to protect their constituencies. Understanding the international customary norms applicable for detecting and mitigating DNS abuse from the perspective of the global incident response community is critical for the open Internet’s stability, security and resiliency. See also https://www.first.org/global/sigs/dns/ for more information.", "icon": "database", "name": "FIRST DNS Abuse Techniques Matrix", "namespace": "first-dns",