Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Data exfiltration 40 found (49 total)

alternate case: data exfiltration

PLATINUM (cybercrime group) (825 words) [view diff] exact match in snippet view article

(SOL) capabilities of Intel's Active Management Technology to perform data exfiltration. PLATINUM has been known to exploit web plugins, at one point infiltrating
Data loss prevention software (1,443 words) [view diff] exact match in snippet view article find links to article
Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking
Air gap (networking) (2,270 words) [view diff] exact match in snippet view article
researchers. Researchers have also demonstrated the feasibility of data exfiltration using FM frequency signals. Examples of the types of networks or systems
Stegomalware (509 words) [view diff] exact match in snippet view article find links to article
attacks: Duqu (to hide malicious payloads in JPEG images for stealthy data exfiltration), Zeus/Zbot (to mask command-and-control (C&C) traffic inside image
Air-gap malware (747 words) [view diff] exact match in snippet view article find links to article
″AirHopper″, a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency
ANT catalog (1,833 words) [view diff] exact match in snippet view article find links to article
mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications
Tunneling protocol (1,956 words) [view diff] case mismatch in snippet view article find links to article
E. (2021). Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities. IEEE Access, 9, 104261-104280. Narteni, S., Vaccari, I
Cyber Insider Threat (1,099 words) [view diff] exact match in snippet view article find links to article
The CINDER Mission will be seen as an unauthorized disclosure once data exfiltration has been realized. At that time, the resultant CINDER Case would change
Yuval Elovici (2,673 words) [view diff] case mismatch in snippet view article find links to article
Boris; Daidakulov, Andrey; Elovici, Yuval (2017-06-04). "xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs". arXiv:1706.01140 [cs.CR]
Radware (650 words) [view diff] exact match in snippet view article find links to article
cloud-based provider of protection against enterprise network breach and data exfiltration. In February 2013, Radware acquired Strangeloop Networks, a leader
MOVEit (1,269 words) [view diff] exact match in snippet view article find links to article
infer information about the structure and contents of the database. Data exfiltration in the widespread May-June attacks by the Russian-speaking cyber crime
FastPOS (384 words) [view diff] case mismatch in snippet view article find links to article
approach to data theft". Retrieved 2016-06-06. "FastPOS Malware works on Data Exfiltration Speed". 5 June 2016. Retrieved 2016-06-05. "Monthly Cyber Threat Briefing"
Iftach Ian Amit (1,041 words) [view diff] exact match in snippet view article find links to article
original research into advanced data exfiltration, in which he uncovered a method for side-channel data exfiltration through various channels - including
Tempest (codename) (4,247 words) [view diff] exact match in snippet view article
"AirHopper", a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency
Operation Newscaster (589 words) [view diff] exact match in snippet view article find links to article
infecting them to a "not particularly sophisticated" malware for data exfiltration. The report says NewsOnAir.org was registered in Tehran and likely
Malware (7,587 words) [view diff] case mismatch in snippet view article find links to article
Ofer; Kedma, Gabi; Mirsky, Yisroel; Elovici, Yuval (2015). GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies (PDF). USENIX Security
Point-of-sale malware (976 words) [view diff] exact match in snippet view article find links to article
information it first block http and ftp traffic that monitors the data exfiltration. It belongs to the family of NewPosThings malware. CenterPOS is a
MultigrainMalware (377 words) [view diff] exact match in snippet view article find links to article
(http) and file transfer protocol (ftp) traffic which monitors the data exfiltration. It exfiltrates the scraped information of credit and debit card via
Security information and event management (3,089 words) [view diff] exact match in snippet view article find links to article
monitor data flow in the network and to detect and prevent potential data exfiltration efforts. In general dedicated Data loss prevention (DLP) take care
Remote mobile virtualization (1,350 words) [view diff] exact match in snippet view article find links to article
organizations from inspecting internal network traffic for attacks and data exfiltration. With mobile app virtualization, organizations can analyze all traffic
Deception technology (1,179 words) [view diff] exact match in snippet view article find links to article
these devices and identify attackers using backdoor placement and data exfiltration. Recent documented cyber attacks on medical devices include x-ray
Universal Plug and Play (4,539 words) [view diff] exact match in snippet view article find links to article
attacks: amplification of requests for use in DDoS; enumeration; and data exfiltration. OCF had published a fix to the protocol specification in April 2020
Trusteer (1,949 words) [view diff] exact match in snippet view article find links to article
information. Apex has three layers of security: exploit prevention, data exfiltration prevention and credentials protection. Apex protects employee credentials
Lapsus$ (2,299 words) [view diff] exact match in snippet view article find links to article
in mid 2023. "DEV-0537 criminal actor targeting organizations for data exfiltration and destruction". Microsoft Security Blog. 22 March 2022. Retrieved
Shellshock (software bug) (3,343 words) [view diff] exact match in snippet view article
"Shellshock in the Wild", Malware droppers, Reverse shells & backdoors, Data exfiltration, and DDoS at FireEye, Inc. Collection of attacks seen in the wild
Cyberwarfare and Iran (4,827 words) [view diff] exact match in snippet view article find links to article
Turkey, India, and Albania. The goal appears to be espionage and data exfiltration from these high-value targets in the aerospace sector. The UK and
Netwrix (2,057 words) [view diff] exact match in snippet view article find links to article
advanced threats such as lateral movement, privilege escalation, and data exfiltration. It uses behavior analytics to identify patterns that may indicate
Intel Management Engine (4,428 words) [view diff] exact match in snippet view article find links to article
exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents. SOL is disabled by default and must be enabled
2016 Democratic National Committee email leak (6,696 words) [view diff] exact match in snippet view article find links to article
opposition research in surprise against Trump ..." He further writes that data exfiltration from political organizations is done by many countries and is considered
2023 MOVEit data breach (876 words) [view diff] case mismatch in snippet view article find links to article
Lioi, Tyler; Palka, Sean (June 5, 2023). "Movin' Out: Identifying Data Exfiltration in MOVEit Transfer Investigations". Retrieved June 5, 2023. Zaveri
Kaspersky Lab (8,453 words) [view diff] exact match in snippet view article find links to article
malware leveraged public cloud infrastructure to perform large-scale data exfiltration and surveillance. The attackers used sophisticated phishing campaigns
Intel Active Management Technology (6,360 words) [view diff] exact match in snippet view article find links to article
exploiting the serial over LAN (SOL) capabilities of AMT to perform data exfiltration of stolen documents. In November 2017 serious flaws were detected
John Jackson (hacker) (1,422 words) [view diff] exact match in snippet view article
Chinese manufacturer may have "expos[ed] users to cyber breaches and data exfiltration". Also in November 2020, Jackson found a server-side request forgery
Pentera (1,471 words) [view diff] exact match in snippet view article find links to article
techniques such as remote code execution, password cracking, and data exfiltration. The platform does not require the installation of software agents
Hubei State Security Department (1,169 words) [view diff] case mismatch in snippet view article find links to article
2024-04-11. "Researchers Shed Light on APT 31's Advanced Backdoors and Data Exfiltration Tactics". The Hacker News. Archived from the original on 2024-03-28
BlackCat (cyber gang) (1,795 words) [view diff] exact match in snippet view article
hackers; access afforded by the beacon allows for reconnaissance, data exfiltration, and security tampering by the beacon, as well as for its lateral
TransApps (5,064 words) [view diff] exact match in snippet view article find links to article
layer through the FUSE project, which focused on defending against data exfiltration by multiple colluding apps. The FUSE app analysis tool helped compute
Jabber Zeus (2,931 words) [view diff] exact match in snippet view article find links to article
Areej; White, Gregory (2012). "Analysis and detection of malicious data exfiltration in web traffic". 2012 7th International Conference on Malicious and
Department of Government Efficiency (26,991 words) [view diff] exact match in snippet view article find links to article
— tools that he said appeared to be designed to automate and mask data exfiltration. There was a tool to generate a seemingly endless number of IP addresses
2016 United States election leaks (13,170 words) [view diff] exact match in snippet view article find links to article
opposition research in surprise against Trump ..." He further writes that data exfiltration from political organizations is done by many countries and is considered