Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Data exfiltration 36 found (40 total)

alternate case: data exfiltration

PLATINUM (cybercrime group) (826 words) [view diff] exact match in snippet view article

(SOL) capabilities of Intel's Active Management Technology to perform data exfiltration. PLATINUM has been known to exploit web plugins, at one point infiltrating
Data loss prevention software (1,432 words) [view diff] exact match in snippet view article find links to article
Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking
Air gap (networking) (2,263 words) [view diff] exact match in snippet view article
researchers. Researchers have also demonstrated the feasibility of data exfiltration using FM frequency signals. Examples of the types of networks or systems
Air-gap malware (775 words) [view diff] exact match in snippet view article find links to article
″AirHopper″, a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency
ANT catalog (1,739 words) [view diff] exact match in snippet view article find links to article
mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications
Tunneling protocol (1,864 words) [view diff] case mismatch in snippet view article find links to article
E. (2021). Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities. IEEE Access, 9, 104261-104280. Narteni, S., Vaccari, I
Cyber Insider Threat (1,033 words) [view diff] exact match in snippet view article find links to article
The CINDER Mission will be seen as an unauthorized disclosure once data exfiltration has been realized. At that time, the resultant CINDER Case would change
Yuval Elovici (2,670 words) [view diff] case mismatch in snippet view article find links to article
Boris; Daidakulov, Andrey; Elovici, Yuval (2017-06-04). "xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs". arXiv:1706.01140 [cs.CR]
Iftach Ian Amit (971 words) [view diff] exact match in snippet view article find links to article
original research into advanced data exfiltration, in which he uncovered a method for side-channel data exfiltration through various channels - including
Radware (651 words) [view diff] exact match in snippet view article find links to article
cloud-based provider of protection against enterprise network breach and data exfiltration. In February 2013, Radware acquired Strangeloop Networks, a leader
MOVEit (1,269 words) [view diff] exact match in snippet view article find links to article
infer information about the structure and contents of the database. Data exfiltration in the widespread May-June attacks by the Russian-speaking cyber crime
Tempest (codename) (4,229 words) [view diff] exact match in snippet view article
"AirHopper", a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency
Malware (7,384 words) [view diff] case mismatch in snippet view article find links to article
Security Foundations Symposium, Verona, 2015, pp. 276-289. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. Mordechai Guri, Assaf
FastPOS (384 words) [view diff] case mismatch in snippet view article find links to article
approach to data theft". Retrieved 2016-06-06. "FastPOS Malware works on Data Exfiltration Speed". 5 June 2016. Retrieved 2016-06-05. "Monthly Cyber Threat Briefing"
Operation Newscaster (589 words) [view diff] exact match in snippet view article find links to article
infecting them to a "not particularly sophisticated" malware for data exfiltration. The report says NewsOnAir.org was registered in Tehran and likely
Point-of-sale malware (976 words) [view diff] exact match in snippet view article find links to article
information it first block http and ftp traffic that monitors the data exfiltration. It belongs to the family of NewPosThings malware. CenterPOS is a
MultigrainMalware (377 words) [view diff] exact match in snippet view article find links to article
(http) and file transfer protocol (ftp) traffic which monitors the data exfiltration. It exfiltrates the scraped information of credit and debit card via
Trusteer (1,914 words) [view diff] exact match in snippet view article find links to article
information. Apex has three layers of security: exploit prevention, data exfiltration prevention and credentials protection. Apex protects employee credentials
Remote mobile virtualization (1,351 words) [view diff] exact match in snippet view article find links to article
organizations from inspecting internal network traffic for attacks and data exfiltration. With mobile app virtualization, organizations can analyze all traffic
Deception technology (1,196 words) [view diff] exact match in snippet view article find links to article
these devices and identify attackers using backdoor placement and data exfiltration. Recent documented cyber attacks on medical devices include x-ray
Lapsus$ (2,236 words) [view diff] exact match in snippet view article find links to article
in mid 2023. "DEV-0537 criminal actor targeting organizations for data exfiltration and destruction". Microsoft Security Blog. 22 March 2022. Retrieved
Shellshock (software bug) (3,342 words) [view diff] exact match in snippet view article
"Shellshock in the Wild", Malware droppers, Reverse shells & backdoors, Data exfiltration, and DDoS at FireEye, Inc. Collection of attacks seen in the wild
Universal Plug and Play (4,537 words) [view diff] exact match in snippet view article find links to article
attacks: amplification of requests for use in DDoS; enumeration; and data exfiltration. OCF had published a fix to the protocol specification in April 2020
Network detection and response (679 words) [view diff] exact match in snippet view article find links to article
and unknown threats from network traffic, like lateral movement or data exfiltration. NDR provides visibility into network activities to identify anomalies
Intel Management Engine (4,573 words) [view diff] exact match in snippet view article find links to article
exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents. SOL is disabled by default and must be enabled
2023 MOVEit data breach (679 words) [view diff] case mismatch in snippet view article find links to article
Lioi, Tyler; Palka, Sean (June 5, 2023). "Movin' Out: Identifying Data Exfiltration in MOVEit Transfer Investigations". Retrieved June 5, 2023. Zaveri
Intel Active Management Technology (6,303 words) [view diff] exact match in snippet view article find links to article
exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents. In November 2017 serious flaws were detected
Candiru (spyware company) (2,248 words) [view diff] exact match in snippet view article
enforcement agencies and intelligence agencies to aid surveillance, data exfiltration, and offensive cyber operations. It deals with government clients
2016 Democratic National Committee email leak (6,680 words) [view diff] exact match in snippet view article find links to article
opposition research in surprise against Trump ..." He further writes that data exfiltration from political organizations is done by many countries and is considered
Pentera (1,034 words) [view diff] exact match in snippet view article find links to article
techniques such as remote code execution, password cracking, and data exfiltration. The platform does not require the installation of software agents
John Jackson (hacker) (1,422 words) [view diff] exact match in snippet view article
Chinese manufacturer may have "expos[ed] users to cyber breaches and data exfiltration". Also in November 2020, Jackson found a server-side request forgery
Hubei State Security Department (1,176 words) [view diff] case mismatch in snippet view article find links to article
2024-04-11. "Researchers Shed Light on APT 31's Advanced Backdoors and Data Exfiltration Tactics". The Hacker News. Archived from the original on 2024-03-28
BlackCat (cyber gang) (1,642 words) [view diff] exact match in snippet view article
Cobalt Strike was used to conduct reconnaissance, lateral movement, data exfiltration, and tampering with security software. The threat actors gained domain
TransApps (5,055 words) [view diff] exact match in snippet view article find links to article
layer through the FUSE project, which focused on defending against data exfiltration by multiple colluding apps. The FUSE app analysis tool helped compute
Jabber Zeus (2,842 words) [view diff] exact match in snippet view article find links to article
Areej; White, Gregory (2012). "Analysis and detection of malicious data exfiltration in web traffic". 2012 7th International Conference on Malicious and
2016 United States election leaks (12,948 words) [view diff] exact match in snippet view article find links to article
opposition research in surprise against Trump ..." He further writes that data exfiltration from political organizations is done by many countries and is considered