In recent years, the number of software vulnerabilities discovered has grown significantly. This creates a need for prioritizing the response to new disclosures by assess-ing which vulnerabilities are likely to be exploited and by quickly ruling out the vulnerabilities that are not actually exploited in the real world. We conduct a quantitative and qualitative exploration of the vulnerability-related information disseminated on Twitter. We then describe the design of a Twitter-based exploit detector, and we in-troduce a threat model specific to our problem. In addi-tion to response prioritization, our detection techniques have applications in risk modeling for cyber-insurance and they highlight the value of information provided by the victi...
Social media has become an important part of the lives of their hundreds of millions of users. Hacke...
This paper tests disruption strategies in Twitter networks contain-ing malicious URLs used in d...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Part 3: Secuirty Management / ForensicInternational audienceIn the last couple of years, the number ...
We propose a software architectural model, which uses reactive programming for collecting and filter...
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furth...
Social media has been used as a tool for the dissemination and exchange of information among people ...
Cybercrime is a growing threat for firms and customers that emerged with the digitization of busines...
In this study we expose the serious large-scale threat of crim-inal account hijacking and the result...
How can Twitter be exploited to fulfill information needs of users on Twitter during incidents? In t...
Abstract—Malware propagation in social networks is a po-tential risk that has not been well-studied ...
In recent years, the increasing number of cyber-attacks has gained the development of innovative too...
In these times of increasing cybersecurity threats, monitoring and analysing cybersecurity events in...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Twitter has become one of the most popular microblogging sites for people to broadcast (or “tweet”) ...
Social media has become an important part of the lives of their hundreds of millions of users. Hacke...
This paper tests disruption strategies in Twitter networks contain-ing malicious URLs used in d...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Part 3: Secuirty Management / ForensicInternational audienceIn the last couple of years, the number ...
We propose a software architectural model, which uses reactive programming for collecting and filter...
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furth...
Social media has been used as a tool for the dissemination and exchange of information among people ...
Cybercrime is a growing threat for firms and customers that emerged with the digitization of busines...
In this study we expose the serious large-scale threat of crim-inal account hijacking and the result...
How can Twitter be exploited to fulfill information needs of users on Twitter during incidents? In t...
Abstract—Malware propagation in social networks is a po-tential risk that has not been well-studied ...
In recent years, the increasing number of cyber-attacks has gained the development of innovative too...
In these times of increasing cybersecurity threats, monitoring and analysing cybersecurity events in...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Twitter has become one of the most popular microblogging sites for people to broadcast (or “tweet”) ...
Social media has become an important part of the lives of their hundreds of millions of users. Hacke...
This paper tests disruption strategies in Twitter networks contain-ing malicious URLs used in d...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...