Air‐Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units
Several security tools have been described in recent times to assist security teams; however,
the effectiveness and success remain limited to specific devices. Phishing is a type of …
the effectiveness and success remain limited to specific devices. Phishing is a type of …
Enhancing cyber-threat intelligence in the arab world: Leveraging ioc and misp integration
Cybercrime threat intelligence enables proactive measures against threat actors and
informed, data-driven security decisions. This study proposes a practical implementation of …
informed, data-driven security decisions. This study proposes a practical implementation of …
Practical Cyber Threat and OSINT Analysis based on Implementation of CTI Sharing Platform
I Alzahrani, S Lee, K Kim - 2024 - preprints.org
Abstract Cybercrime Threat Intelligence (CTI) allows us to change our actions from reactive
to proactive in the fight against threat actors, and to make more informed, data-driven …
to proactive in the fight against threat actors, and to make more informed, data-driven …
A novel flow-based statistical pattern recognition architecture to detect and classify pivot attacks
RS Marques - 2022 - wlv.openrepository.com
Pivot attack or pivoting is a well-known technique used by threat actors to cover their tracks
and overcome connectivity restrictions imposed by the network defences or topology …
and overcome connectivity restrictions imposed by the network defences or topology …
[CITACE][C] Air-Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units
P Bottu, J Thomason - … Journal of Wireless Communication Networks and …, 2024