Moozonian
Web Images Developer News Books Maps Shopping Moo-AI Generate Art
Showing results for cyberattacks
Titan-Apex v9.4 is analyzing data for 'cyberattacks'...
icon http://arxiv.org/abs/1912.03589v1

Detecting Cyberattacks in Industrial Control Systems Using Online...

Industrial control systems are critical to the operation of industrial facilities, especially for critical infrastructures, such as refineries, power grids, and transportation systems. Similar to othe...
icon https://www.bing.com/ck/a?!&&p=a5473d61cbdd0689ad95763111f8a352779ccbf96f55a25efe2e6fee269989cfJmltdHM9MTc3MjU4MjQwMA&ptn=3&ver=2&hsh=4&fclid=2bf11597-a499-63ce-1cd8-0284a55f6246&u=a1aHR0cHM6Ly93d3cud2Vmb3J1bS5vcmcvc3Rvcmllcy8yMDI0LzExL29mZnNob3JlLXdpbmQtaW5kdXN0cnktY3liZXJzZWN1cml0eS8&ntb=1

Cybersecurity guidance for the global offshore wind industry

Nov 15, 2024 · Offshore wind power capacity is expanding rapidly, as are the cyberattacks against them. A new joint project offers guidance on cybersecurity.
icon https://www.bing.com/ck/a?!&&p=d6f5d142f8e81833871a54aadb1e56358eaf6c500651efd0ac80e0aa66d2a505JmltdHM9MTc3MjQ5NjAwMA&ptn=3&ver=2&hsh=4&fclid=2f6e899c-614c-6e0f-2af9-9e8d60826f8f&u=a1aHR0cHM6Ly93d3cubWljcm9zb2Z0LmNvbS9lbi11cy9zZWN1cml0eT9tc29ja2lkPTJmNmU4OTljNjE0YzZlMGYyYWY5OWU4ZDYwODI2Zjhm&ntb=1

Cloud Security Solutions | Microsoft Security

Defend your data from cyberattacks using cloud data security solutions. Safeguard your infrastructure, apps, and data with Microsoft Security solutions.
icon https://www.microsoft.com/en-us/security/business

Cloud Security Solutions | Microsoft Security

Defend your data from cyberattacks using cloud data security solutions. Safeguard your infrastructure, apps, and data with Microsoft Security solutions.
icon https://www.microsoft.com/en-us/security?wt.mc_id=AID730391_QSG_BLOG_319247&ocid=AID730391_QSG_BLOG_319247

Cloud Security Solutions | Microsoft Security

Defend your data from cyberattacks using cloud data security solutions. Safeguard your infrastructure, apps, and data with Microsoft Security solutions.
icon https://www.microsoft.com/en-us/security/business/solutions/ai-powered-unified-secops-platform

AI-Powered Security Operations | Microsoft Security

Protect your multicloud, multiplatform environment with AI-powered unified SecOps from Microsoft Security. Anticipate cyberthreats and prevent cyberattacks.
icon https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-endpoint

Microsoft Defender for Endpoint | Microsoft Security

Strengthen endpoint protection with Microsoft Defender for Endpoint. Stop cyberattacks, boost endpoint security with AI, and secure your devices. Try it now.
icon https://www.bing.com/ck/a?!&&p=29583b09a09666e67a90d60ad586f0fcd1ad9928331cce8abba7ae60841008caJmltdHM9MTc3MjIzNjgwMA&ptn=3&ver=2&hsh=4&fclid=1a4261e5-9b2f-6a8b-1146-76ea9a486b74&u=a1aHR0cHM6Ly9zYWZld2ViLm5vcnRvbi5jb20v&ntb=1

Safeweb

Shield yourself from the latest browser-based cyberattacks by installing Norton extensions. Experience more peace of mind today. One of your best defenses against browsing, banking, social media, and ...
icon http://arxiv.org/abs/2201.02601v1

Apples and Cars: a Comparison of Security

Cybersecurity has gained importance for cars that increasingly rely on software and networks. "Smartphone on wheels" is often used as an analogy to highlight the need for security. As a high-value tar...
icon http://arxiv.org/abs/2505.19338v1

Co-evolutionary Dynamics of Attack and Defence in Cybersecurity

In the evolving digital landscape, it is crucial to study the dynamics of cyberattacks and defences. This study uses an Evolutionary Game Theory (EGT) framework to investigate the evolutionary dynamic...
icon http://arxiv.org/abs/2212.13721v1

Emerging Mobile Phone-based Social Engineering Cyberattacks in th...

The number of registered SIM cards and active mobile phone subscribers in Zambia in 2020 surpassed the population of the country. This clearly shows that mobile phones in Zambia have become part of ev...
icon http://arxiv.org/abs/1912.12673v1

Cyber Situation Awareness with Active Learning for Intrusion Dete...

Intrusion detection has focused primarily on detecting cyberattacks at the event-level. Since there is such a large volume of network data and attacks are minimal, machine learning approaches have foc...
icon http://arxiv.org/abs/2511.03020v1

Exploratory Analysis of Cyberattack Patterns on E-Commerce Platfo...

Cyberattacks on e-commerce platforms have grown in sophistication, threatening consumer trust and operational continuity. This research presents a hybrid analytical framework that integrates statistic...
icon http://arxiv.org/abs/2406.11618v4

SoK: A Literature and Engineering Review of Regular Expression De...

Regular Expression Denial of Service (ReDoS) is a vulnerability class that has become prominent in recent years. Attackers can weaponize such weaknesses as part of asymmetric cyberattacks that exploit...
icon https://www.bing.com/ck/a?!&&p=878a7c88ef37dd549a200dcd0548f3dc097ac33e0f4d6b34ae52e86a6379b401JmltdHM9MTc3MjU4MjQwMA&ptn=3&ver=2&hsh=4&fclid=06b4c7bc-7865-649f-3a19-d0ae79896582&u=a1aHR0cHM6Ly9zYWZld2ViLm5vcnRvbi5jb20v&ntb=1

Norton - Safeweb

Shield yourself from the latest browser-based cyberattacks by installing Norton extensions. Experience more peace of mind today. Safe Web
icon https://www.bing.com/ck/a?!&&p=eb13aa95afa766e575bebf19097e3b24e9fdef7cc97a43dc8ba279ef4091a9f2JmltdHM9MTc3MjU4MjQwMA&ptn=3&ver=2&hsh=4&fclid=06b4c7bc-7865-649f-3a19-d0ae79896582&u=a1aHR0cHM6Ly9zYWZld2ViLm5vcnRvbi5jb20vP3VsYW5nPWRldQ&ntb=1

Safeweb - Norton

Shield yourself from the latest browser-based cyberattacks by installing Norton extensions. Experience more peace of mind today. Safe Web
icon https://www.bing.com/ck/a?!&&p=43f1d98298fc9d91c86670fe857a527e8a0dbdcbe4c3cedb577b1a1c0189a02fJmltdHM9MTc3MjU4MjQwMA&ptn=3&ver=2&hsh=4&fclid=06b4c7bc-7865-649f-3a19-d0ae79896582&u=a1aHR0cHM6Ly9zYWZld2ViLm5vcnRvbi5jb20vP3VsYW5nPWRldSZTU0RDQVQ9MjYzJmRpc3BsYW5nPWlzbzM6REVVJmRpc3Bsb2NhbGU9aXNvMzpERVUmZW52PXByb2Qmb3JpZ2luPWFtc3cmdmVyc2lvbj0xLjA&ntb=1

Safeweb

Shield yourself from the latest browser-based cyberattacks by installing Norton extensions. Experience more peace of mind today. Safe Web
icon https://www.bing.com/ck/a?!&&p=8f5084cfb4b32fa94edcb769f359719ea172af9419445cbf2c116b4d833d662aJmltdHM9MTc3MjU4MjQwMA&ptn=3&ver=2&hsh=4&fclid=06b4c7bc-7865-649f-3a19-d0ae79896582&u=a1aHR0cHM6Ly9zYWZld2ViLm5vcnRvbi5jb20vP3VsYW5nPWVuZyZzc2RjYXQ9MjYzJmRpc3BsYW5nPWlzbzM6ZW5nJmRpc3BOYW1lPXRydWUmZGlzcE5hbWU9dHJ1ZSZkaXNwTmFtZT10cnVl&ntb=1

Safeweb - Norton

Shield yourself from the latest browser-based cyberattacks by installing Norton extensions. Experience more peace of mind today. Safe Web One of your best defenses against browsing, banking, social â...
icon https://mobile.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html?smprod=nytcore-iphone&smid=nytcore-iphone-share&_r=1&referer=https://www.rt.com/news/388153-thousands-ransomeware-attacks-worldwide/

Cyberattacks in 12 Nations Said to Use Leaked N.S.A. Hacking Tool

Points: 1248 | Comments: 478 | Author: ghosh
icon http://arxiv.org/abs/2310.04197v1

Threat Trekker: An Approach to Cyber Threat Hunting

Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assu...