Detecting and characterizing lateral phishing at scale [PDF]
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A +7 more
core +2 more sources
Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean +5 more
core +3 more sources
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Gabor-based Fingerprint Authentication for Anti-phishing System [PDF]
E-banking is banking system in which the customers conduct transactions electronically via the Internet. Most of these sites are prone to a phishing attack.
Soukaena H. Hashem +2 more
doaj +1 more source
Characterizing Phishing Threats with Natural Language Processing
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core +1 more source
Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley +1 more source
Personalized Model‐Driven Interventions for Decisions From Experience
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford +6 more
wiley +1 more source
A phishing attack awareness framework for a South African University of Technology
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb +2 more
doaj +1 more source
Qualitative exploration of trust towards online banking for phishing attack victims / Siti Sarah Md Ilyas [PDF]
The number of phishing attacks involving online banking has records an increase percentage over the years in Malaysia. Phishing attacks impact the victims in various sentiments of emotional, mental and physical. The enormous effect is the victims exposed
Md Ilyas, Siti Sarah
core
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source

