language:
Find link is a tool written by Edward Betts.searching for Data exfiltration 40 found (49 total)
alternate case: data exfiltration
PLATINUM (cybercrime group)
(825 words)
[view diff]
exact match in snippet
view article
(SOL) capabilities of Intel's Active Management Technology to perform data exfiltration. PLATINUM has been known to exploit web plugins, at one point infiltratingData loss prevention software (1,443 words) [view diff] exact match in snippet view article find links to article
Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blockingAir gap (networking) (2,270 words) [view diff] exact match in snippet view article
researchers. Researchers have also demonstrated the feasibility of data exfiltration using FM frequency signals. Examples of the types of networks or systemsStegomalware (509 words) [view diff] exact match in snippet view article find links to article
attacks: Duqu (to hide malicious payloads in JPEG images for stealthy data exfiltration), Zeus/Zbot (to mask command-and-control (C&C) traffic inside imageAir-gap malware (747 words) [view diff] exact match in snippet view article find links to article
″AirHopper″, a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequencyANT catalog (1,833 words) [view diff] exact match in snippet view article find links to article
mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communicationsTunneling protocol (1,956 words) [view diff] case mismatch in snippet view article find links to article
E. (2021). Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities. IEEE Access, 9, 104261-104280. Narteni, S., Vaccari, ICyber Insider Threat (1,099 words) [view diff] exact match in snippet view article find links to article
The CINDER Mission will be seen as an unauthorized disclosure once data exfiltration has been realized. At that time, the resultant CINDER Case would changeYuval Elovici (2,673 words) [view diff] case mismatch in snippet view article find links to article
Boris; Daidakulov, Andrey; Elovici, Yuval (2017-06-04). "xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs". arXiv:1706.01140 [cs.CR]Radware (650 words) [view diff] exact match in snippet view article find links to article
cloud-based provider of protection against enterprise network breach and data exfiltration. In February 2013, Radware acquired Strangeloop Networks, a leaderMOVEit (1,269 words) [view diff] exact match in snippet view article find links to article
infer information about the structure and contents of the database. Data exfiltration in the widespread May-June attacks by the Russian-speaking cyber crimeFastPOS (384 words) [view diff] case mismatch in snippet view article find links to article
approach to data theft". Retrieved 2016-06-06. "FastPOS Malware works on Data Exfiltration Speed". 5 June 2016. Retrieved 2016-06-05. "Monthly Cyber Threat Briefing"Iftach Ian Amit (1,041 words) [view diff] exact match in snippet view article find links to article
original research into advanced data exfiltration, in which he uncovered a method for side-channel data exfiltration through various channels - includingTempest (codename) (4,247 words) [view diff] exact match in snippet view article
"AirHopper", a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequencyOperation Newscaster (589 words) [view diff] exact match in snippet view article find links to article
infecting them to a "not particularly sophisticated" malware for data exfiltration. The report says NewsOnAir.org was registered in Tehran and likelyMalware (7,587 words) [view diff] case mismatch in snippet view article find links to article
Ofer; Kedma, Gabi; Mirsky, Yisroel; Elovici, Yuval (2015). GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies (PDF). USENIX SecurityPoint-of-sale malware (976 words) [view diff] exact match in snippet view article find links to article
information it first block http and ftp traffic that monitors the data exfiltration. It belongs to the family of NewPosThings malware. CenterPOS is aMultigrainMalware (377 words) [view diff] exact match in snippet view article find links to article
(http) and file transfer protocol (ftp) traffic which monitors the data exfiltration. It exfiltrates the scraped information of credit and debit card viaSecurity information and event management (3,089 words) [view diff] exact match in snippet view article find links to article
monitor data flow in the network and to detect and prevent potential data exfiltration efforts. In general dedicated Data loss prevention (DLP) take careRemote mobile virtualization (1,350 words) [view diff] exact match in snippet view article find links to article
organizations from inspecting internal network traffic for attacks and data exfiltration. With mobile app virtualization, organizations can analyze all trafficDeception technology (1,179 words) [view diff] exact match in snippet view article find links to article
these devices and identify attackers using backdoor placement and data exfiltration. Recent documented cyber attacks on medical devices include x-rayUniversal Plug and Play (4,539 words) [view diff] exact match in snippet view article find links to article
attacks: amplification of requests for use in DDoS; enumeration; and data exfiltration. OCF had published a fix to the protocol specification in April 2020Trusteer (1,949 words) [view diff] exact match in snippet view article find links to article
information. Apex has three layers of security: exploit prevention, data exfiltration prevention and credentials protection. Apex protects employee credentialsLapsus$ (2,299 words) [view diff] exact match in snippet view article find links to article
in mid 2023. "DEV-0537 criminal actor targeting organizations for data exfiltration and destruction". Microsoft Security Blog. 22 March 2022. RetrievedShellshock (software bug) (3,343 words) [view diff] exact match in snippet view article
"Shellshock in the Wild", Malware droppers, Reverse shells & backdoors, Data exfiltration, and DDoS at FireEye, Inc. Collection of attacks seen in the wildCyberwarfare and Iran (4,827 words) [view diff] exact match in snippet view article find links to article
Turkey, India, and Albania. The goal appears to be espionage and data exfiltration from these high-value targets in the aerospace sector. The UK andNetwrix (2,057 words) [view diff] exact match in snippet view article find links to article
advanced threats such as lateral movement, privilege escalation, and data exfiltration. It uses behavior analytics to identify patterns that may indicateIntel Management Engine (4,428 words) [view diff] exact match in snippet view article find links to article
exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents. SOL is disabled by default and must be enabled2016 Democratic National Committee email leak (6,696 words) [view diff] exact match in snippet view article find links to article
opposition research in surprise against Trump ..." He further writes that data exfiltration from political organizations is done by many countries and is considered2023 MOVEit data breach (876 words) [view diff] case mismatch in snippet view article find links to article
Lioi, Tyler; Palka, Sean (June 5, 2023). "Movin' Out: Identifying Data Exfiltration in MOVEit Transfer Investigations". Retrieved June 5, 2023. ZaveriKaspersky Lab (8,453 words) [view diff] exact match in snippet view article find links to article
malware leveraged public cloud infrastructure to perform large-scale data exfiltration and surveillance. The attackers used sophisticated phishing campaignsIntel Active Management Technology (6,360 words) [view diff] exact match in snippet view article find links to article
exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents. In November 2017 serious flaws were detectedJohn Jackson (hacker) (1,422 words) [view diff] exact match in snippet view article
Chinese manufacturer may have "expos[ed] users to cyber breaches and data exfiltration". Also in November 2020, Jackson found a server-side request forgeryPentera (1,471 words) [view diff] exact match in snippet view article find links to article
techniques such as remote code execution, password cracking, and data exfiltration. The platform does not require the installation of software agentsHubei State Security Department (1,169 words) [view diff] case mismatch in snippet view article find links to article
2024-04-11. "Researchers Shed Light on APT 31's Advanced Backdoors and Data Exfiltration Tactics". The Hacker News. Archived from the original on 2024-03-28BlackCat (cyber gang) (1,795 words) [view diff] exact match in snippet view article
hackers; access afforded by the beacon allows for reconnaissance, data exfiltration, and security tampering by the beacon, as well as for its lateralTransApps (5,064 words) [view diff] exact match in snippet view article find links to article
layer through the FUSE project, which focused on defending against data exfiltration by multiple colluding apps. The FUSE app analysis tool helped computeJabber Zeus (2,931 words) [view diff] exact match in snippet view article find links to article
Areej; White, Gregory (2012). "Analysis and detection of malicious data exfiltration in web traffic". 2012 7th International Conference on Malicious andDepartment of Government Efficiency (26,991 words) [view diff] exact match in snippet view article find links to article
— tools that he said appeared to be designed to automate and mask data exfiltration. There was a tool to generate a seemingly endless number of IP addresses2016 United States election leaks (13,170 words) [view diff] exact match in snippet view article find links to article
opposition research in surprise against Trump ..." He further writes that data exfiltration from political organizations is done by many countries and is considered