Event Detection and Extraction (EDX) Explorer
Home
Event Detection
Data
Demonstration
The LEAF Lab
Data
Events
CASIE Event Types
Sorted by
Instance Count
Alphabet
Vulnerability-related.DiscoverVulnerability
2132
discovered (107)
found (107)
be exploited (75)
said (72)
exploited (54)
disclosed (54)
affects (49)
reported (40)
affecting (38)
revealed (37)
are vulnerable (27)
affected (26)
was discovered (24)
says (24)
identified (20)
affect (16)
being exploited (16)
been exploited (16)
reporting (15)
confirmed (14)
exists in (14)
published (13)
impacts (12)
was found (12)
discovering (12)
find (12)
report (10)
resides in (10)
have discovered (10)
explained (9)
exploit (9)
finding (9)
disclose (9)
tracked as (9)
disclosing (8)
detected (8)
were discovered (8)
told (8)
is vulnerable (8)
uncovered (8)
say (8)
claim (8)
claims (7)
has found (7)
acknowledged (7)
was reported (7)
exist in (7)
announced (7)
impact (7)
reports (7)
the disclosure (7)
disclosure (7)
impacting (6)
observed (6)
noted (6)
posted (6)
were vulnerable (6)
impacted (6)
have found (6)
warning (6)
was vulnerable (5)
noticed (5)
vulnerable (5)
notified (5)
revealing (5)
existed in (5)
has discovered (5)
the discovery (5)
contains (5)
present in (5)
be vulnerable (5)
are affected (5)
ound (5)
presented (5)
listed as not vulnerable (4)
warned (4)
detailed (4)
discover (4)
responsibly disclosed (4)
alerted (4)
has been discovered (4)
indicate (4)
exposed (4)
contained (4)
were found (4)
described (4)
had reported (4)
assigned (4)
notes (4)
were reported (4)
eported (4)
go public (4)
has revealed (4)
was disclosed (4)
aware (4)
are impacted (4)
warns (4)
first reported (4)
was exploited (4)
verified (4)
explains (4)
is present in (4)
the public disclosure (4)
has disclosed (4)
listed as vulnerable (3)
affected by (3)
shared (3)
have uncovered (3)
alert (3)
has reported (3)
exists (3)
aid (3)
discloses (3)
reveal (3)
spotted (3)
claimed (3)
isclosed (3)
ffecting (3)
made public (3)
identifying (3)
highlighted (3)
disclosures (3)
was informed (3)
have been found (3)
has been found (3)
being notified (3)
publish (3)
describes (3)
can be found (3)
is found (3)
in question (3)
is present (3)
has published (3)
designated (3)
ranked (3)
outlined (3)
have confirmed (3)
went public (3)
exploits (3)
describe (3)
informed (3)
found in (3)
responsible disclosure (2)
Discovered (2)
are warning (2)
The findings identified (2)
haven’t seen (2)
showed (2)
is dismissing (2)
explaining (2)
introduced (2)
suffers (2)
had discovered (2)
Claims (2)
are also affected (2)
provide (2)
claiming (2)
provided (2)
known (2)
ffected (2)
have been actively investigating (2)
unearthed (2)
ublished (2)
ffect (2)
wrote (2)
is impacting (2)
privately disclosed (2)
can exploit (2)
said in (2)
is reporting (2)
are discovered (2)
have revealed (2)
dug up (2)
responded quickly (2)
had found (2)
discuss (2)
could be vulnerable (2)
developed (2)
have disclosed (2)
confirm (2)
learned (2)
is described (2)
contacted (2)
warnings (2)
was present in (2)
discovered and reported (2)
receiving a report (2)
was first spotted (2)
finds (2)
Uncovered (2)
shared details (2)
has been assigned (2)
post (2)
recently disclosed (2)
were also discovered (2)
have been discovered (2)
arned (2)
racked as (2)
has acknowledged (2)
is tracked as (2)
was publicly disclosed (2)
“responsibly” disclosed (2)
released information (2)
public disclosure (2)
finding and reporting (2)
was confirmed (2)
were exploited (2)
being published (2)
being discovered (2)
was announced (2)
writes (2)
have been assigned (2)
contain (2)
occurs (2)
submit (2)
classified (2)
were affected (2)
are present in (2)
known as (2)
has known (2)
iscovered (2)
released (2)
recently announced (1)
present (1)
their responsable disclosure (1)
are almost surely vulnerable (1)
been found (1)
started investigating (1)
been reported (1)
designated as (1)
are likely vulnerable (1)
categorize (1)
doesn’t exist on (1)
patches (1)
vulnerability reports (1)
inform (1)
have not been reported (1)
concluded (1)
featured (1)
critical found in (1)
Warning (1)
uncover (1)
have unearthed (1)
known about (1)
was exploiting (1)
were notified (1)
could affect (1)
been discovered (1)
analyzed (1)
the IOActive Labs report (1)
released a report (1)
identify (1)
identified in (1)
find out (1)
reveals the findings (1)
are currently vulnerable (1)
vulnerable to attacks (1)
the vulnerability disclosure (1)
is responsible for finding (1)
was initially reported (1)
tells (1)
has just announced (1)
have raised (1)
Two recent reports (1)
was first detailed (1)
call (1)
arise from (1)
had been discovered (1)
are all considered vulnerable (1)
analysed (1)
tweet out (1)
tweeted out (1)
tweeted about (1)
detecting (1)
be found (1)
existed as (1)
confirmed that (1)
was publicly revealed (1)
responsibly reported (1)
published public details (1)
became public (1)
beware of (1)
published a paper (1)
claims to (1)
claims to have exploited (1)
said that (1)
are authentication-related (1)
issued (1)
declared (1)
warned about (1)
was alerted (1)
is said to be aware (1)
are so easy to find (1)
has just downplayed (1)
been confirmed (1)
in question affects (1)
been privately told (1)
stated (1)
discretely reported (1)
presented above (1)
said in response (1)
confirmed the findings (1)
has recommended (1)
have a vulnerable (1)
has been recently publicized (1)
the discovery some (1)
made the discovery (1)
That accidental discovery (1)
first disclosed (1)
divulged (1)
are susceptible (1)
responsibly disclose (1)
both findings (1)
found out (1)
2 publicly disclosed (1)
want to share (1)
don’t reveal (1)
Black Duck’s study (1)
are found (1)
was still found (1)
first exposed (1)
a report posted (1)
recently discovered (1)
added (1)
news breaks (1)
Logged with the identifier (1)
were detailed (1)
saying (1)
shared the revelation (1)
is exploitable (1)
calculates (1)
analysis (1)
reconfirmed (1)
let them know (1)
documented (1)
The latest security scare (1)
also found (1)
received acknowledgement (1)
admitted (1)
may have been known (1)
names (1)
discovery (1)
justify the claims (1)
reported claims (1)
publishing a story claiming (1)
the claims (1)
MedSec's findings and reported (1)
publicized (1)
initially discovered (1)
acknowledge (1)
unsubstantiated claims (1)
reveals (1)
apologized for (1)
statement saying (1)
claimed that (1)
his claims (1)
accused (1)
suggested (1)
were exposed (1)
his latest findings (1)
calls (1)
exploiting (1)
are riddled (1)
were still vulnerable (1)
emphasized (1)
were blamed (1)
being blamed (1)
made headlines (1)
report released (1)
called (1)
proved his claim (1)
their first disclosure (1)
likely exists (1)
publicly disclosed (1)
analyzing (1)
comment regarding (1)
wrote in his disclosure (1)
is reportedly aware (1)
are also vulnerable (1)
is also vulnerable (1)
are available (1)
private disclosures (1)
were published on (1)
were impacted (1)
attacks exploited (1)
also claims (1)
hinted (1)
could remotely exploit (1)
presumes (1)
acknowledged his reports (1)
be active (1)
reported in (1)
note (1)
demonstrated (1)
rooted in (1)
be disclosed (1)
explain (1)
have been staunchly dismissed (1)
published a report (1)
cited research (1)
as highlighted (1)
ave warned (1)
release details (1)
tracked (1)
go public and inform (1)
published his findings (1)
uggested (1)
laims (1)
publicly released (1)
has been responsibly disclosed (1)
has released (1)
were informed (1)
had disabled (1)
suspects (1)
located (1)
has affected (1)
had inserted (1)
denied (1)
branded (1)
was documented (1)
stresses (1)
was claimed (1)
have expressed concern (1)
were detected (1)
has detected (1)
are explained (1)
wasn’t discovered (1)
emerged (1)
are most likely vulnerable (1)
has failed (1)
publishing research (1)
publishing (1)
90 days’ warning (1)
officially known as (1)
was still vulnerable (1)
has exploited (1)
launched (1)
so-called (1)
are well documented (1)
involves (1)
arises (1)
have been revealed (1)
first emerged (1)
filed (1)
alleges (1)
claims to have uncovered (1)
never reported (1)
are finding (1)
has supposedly found (1)
he issue reported. (1)
riginally found (1)
laimed (1)
re unknown (1)
erified (1)
e vulnerable. (1)
wo other previously disclosed (1)
ere disclosed (1)
has been actively investigating (1)
confirmed the existence (1)
notify (1)
is located in (1)
was classified (1)
submitted a write-up (1)
are still vulnerable (1)
first came out (1)
extended (1)
was actually found (1)
escribed (1)
ere discovered (1)
etailed (1)
are detected (1)
detects (1)
has said (1)
had to tell (1)
His presentation (1)
had (1)
saw that (1)
doesn't just warn (1)
a report (1)
reported the discovery (1)
were published online (1)
is claiming (1)
characterized (1)
was developed (1)
a highly detailed blog post published (1)
advisory warned (1)
has demonstrated (1)
put out an advisory warning (1)
were not affected (1)
was unintentionally introduced (1)
were never discovered (1)
are living inside (1)
the findings (1)
reportedly have (1)
has been known (1)
Designated (1)
a disclosure (1)
explore and find (1)
does not know (1)
mentioned (1)
notice (1)
is riddled (1)
are in (1)
has uncovered (1)
was reintroduced (1)
have been classified (1)
rated (1)
has classified (1)
is exploited (1)
have (1)
get discovered (1)
have had their fair share (1)
fail to realize (1)
sharing (1)
locate and report (1)
has described as (1)
submitted a post (1)
has been disclosed (1)
became apparent (1)
was investigating (1)
contends (1)
blog post (1)
looked at (1)
are emerging (1)
provides (1)
appeared (1)
has unearthed (1)
posed (1)
the Onapsis report (1)
is affected by (1)
revolves around (1)
has been present (1)
do know (1)
reiterate (1)
point out (1)
had been present (1)
was identified (1)
originally discovered (1)
are exploited (1)
The discovery (1)
vulnerability reports are issued (1)
exists on (1)
was affected (1)
is affecting (1)
was assigned (1)
being tracked as (1)
are made public (1)
is rooted in (1)
was made public (1)
were not vulnerable (1)
termed as (1)
state (1)
are looking (1)
remains vulnerable (1)
being left vulnerable (1)
appeared in (1)
remain vulnerable (1)
has seen (1)
has emerged (1)
Described as (1)
ublicly disclosed (1)
as found (1)
as also identified (1)
oesn’t impact (1)
re potentially impacted (1)
re also impacted (1)
were all found (1)
reported and published (1)
mention (1)
being informed (1)
had impacted (1)
was made aware (1)
have been recognized (1)
receive a CVE (1)
can go public (1)
is affected (1)
uncovering (1)
xploited, (1)
een exploited, (1)
ave all revealed (1)
dentify (1)
isclose (1)
iscovered and reported (1)
esided in (1)
weeding out (1)
submitted the report (1)
stumbled (1)
are disclosed (1)
were also affected (1)
were publicly disclosed (1)
going public (1)
security vulnerability disclosure (1)
posted his finding (1)
arose (1)
released details (1)
first appearing (1)
prompting (1)
the warning (1)
has been identified (1)
is similarly affected (1)
Silvanovich’s report (1)
were reported affecting (1)
doesn't impact (1)
was privately disclosed (1)
flagged (1)
was reportedly identified (1)
is prone (1)
being affected (1)
were uncovered (1)
are described (1)
may have already found (1)
public acknowledgement (1)
points out (1)
didn't assign (1)
allocated (1)
assign a CVE (1)
assign CVEs (1)
has confirmed (1)
has been exposed (1)
having alerted (1)
officially named (1)
was detected (1)
was spotted (1)
have been outlined (1)
lay in (1)
has announced (1)
a bug report submitted (1)
was analyzed (1)
are also known as (1)
has suffered (1)
responded (1)
submitted a report (1)
disclosed the discovery (1)
lie in (1)
revisited (1)
has been uncovered and detailed (1)
reports suggesting (1)
listed (1)
is listed (1)
described as (1)
are deemed (1)
the discovery and disclosure (1)
not to report (1)
turned up (1)
were privately reported (1)
are public (1)
are known (1)
come across (1)
track (1)
knows (1)
has now received CVE (1)
received the CVE (1)
being found (1)
labelled with CVEs (1)
appears to be (1)
asn't been publicly disclosed. (1)
xploited (1)
the note said (1)
lies in (1)
dentified (1)
otes (1)
ffects (1)
has claimed (1)
has since said (1)
was notified (1)
has notified (1)
were disclosed (1)
were confirmed (1)
the original vulnerability report (1)
came to public (1)
the reported flaws (1)
is described as (1)
was introduced (1)
were made public (1)
have also affected (1)
was considered vulnerable (1)
has rated (1)
are disclosing (1)
laid out (1)
have been made public (1)
won’t emerge (1)
the Kubernetes vulnerability reporting process (1)
its public disclosure (1)
a vulnerability's discovery (1)
be present in (1)
have been issued (1)
accept the risk (1)
had responsibly disclosed (1)
suffered (1)
assigned CVE (1)
first identifying (1)
being publicly disclosed (1)
post published (1)
exposure on public (1)
has been tagged as (1)
Exploiting (1)
recently made aware (1)
are publicly known (1)
hasn’t indicated (1)
have been identified (1)
has flagged (1)
has warned (1)
announcing (1)
make public (1)
ave been just as vulnerable (1)
erify (1)
received a CVE (1)
are not vulnerable (1)
security alerts (1)
Impacted (1)
assign one CVE (1)
have also confirmed (1)
without forewarning (1)
expose (1)
remained in (1)
discovered and disclosed (1)
hold off on publishing (1)
impact on (1)
unaffected (1)
the public release (1)
are reacting (1)
clarified (1)
will be affected (1)
s exploited. (1)
were published (1)
been rated (1)
did not highlight (1)
Attack.Databreach
1777
steal (106)
data breach (45)
exposed (40)
access (39)
breach (37)
stolen (35)
leaked (31)
data breaches (30)
stole (28)
the breach (26)
stealing (22)
compromised (22)
a data breach (21)
was stolen (21)
were stolen (17)
was compromised (16)
leak (15)
the attack (15)
gain access (15)
was accessed (15)
obtain (14)
have been compromised (13)
hack (13)
were compromised (13)
breaches (13)
collect (12)
the leak (12)
exfiltrate (12)
compromise (12)
collecting (11)
has been compromised (11)
have stolen (10)
unauthorized access (10)
obtained (10)
have accessed (10)
collected (9)
the data breach (9)
intercept (8)
dumped (8)
exposing (8)
were leaked (8)
The breach (8)
harvest (8)
hacking (8)
a breach (8)
were exposed (8)
the incident (8)
published (7)
been stolen (7)
hacked (7)
accessed (7)
gained access (7)
been leaked (6)
have been obtained (6)
collects (6)
leaking (6)
compromising (6)
was obtained (6)
was exposed (6)
were accessed (6)
had been compromised (6)
exfiltration (5)
was leaked (5)
released (5)
leaks (5)
previously compromised (5)
the data dump (5)
have been stolen (5)
extract (5)
get (5)
been compromised (5)
was breached (5)
have been accessed (5)
being leaked (4)
data exfiltration (4)
The dump (4)
exfiltrated (4)
obtain access (4)
was hacked (4)
has access (4)
this breach (4)
harvesting (4)
stealing data (4)
the exposure (4)
data leakage (4)
exposure (4)
teal (4)
steals (4)
theft (4)
an attack (4)
had been stolen (4)
data leaks (4)
the hack (4)
attacks (4)
was not compromised (4)
a hack (4)
was taken (4)
have been exposed (4)
attack (4)
being stolen (3)
data dump (3)
That breach (3)
the theft (3)
dump (3)
harvests (3)
has stolen (3)
have not been any breaches (3)
data stolen (3)
has exposed (3)
selling (3)
obtained access (3)
have exposed (3)
data leak (3)
gaining access (3)
have had access (3)
had access (3)
tealing (3)
is selling (3)
data theft (3)
retrieve (3)
the attacks (3)
capture (3)
being shared (3)
unauthorised access (3)
The data breach (3)
had exfiltrated (2)
intercepted (2)
access and watch (2)
was leaking (2)
were corrupted (2)
health data breach (2)
collect and download (2)
had been hacked (2)
copies (2)
accessing (2)
be stolen (2)
had accessed (2)
ata breach (2)
btain (2)
had stolen (2)
get access (2)
ntercept (2)
the leaks (2)
have leaked (2)
break into (2)
has leaked (2)
can intercept (2)
exfiltrate data (2)
searched for track data (2)
have been intercepted (2)
The data dump (2)
these attacks (2)
attacked (2)
has attacked (2)
has been breached (2)
shared (2)
information theft (2)
a major data breach (2)
extracting (2)
have access (2)
had been breached (2)
accounts stolen (2)
ccess (2)
perform any action (2)
the data leak (2)
the second breach (2)
slurp (2)
grab (2)
acking (2)
taken (2)
been hacked (2)
has been exposed (2)
have compromised (2)
expose (2)
be exposed (2)
hacks (2)
as compromised. (2)
ompromised (2)
as compromised, (2)
exfiltrating (2)
the leaking (2)
eavesdrop (2)
was acquired (2)
have been viewed (2)
acquired or removed (2)
The attacks (2)
have exfiltrated (2)
was collected (2)
has been obtained (2)
have not been breached (2)
breached (2)
has been accessed (2)
been breached (2)
posted (2)
had been accessed (2)
being compromised (2)
this data breach (2)
were not compromised (2)
exposed by the breach (2)
eached, (1)
ta security breach w (1)
e exposed t (1)
information security breach o (1)
ld p (1)
ve stolen p (1)
to collect (1)
read (1)
the dump (1)
The big takeaway (1)
document dump (1)
walked out of (1)
the actual breach (1)
data breaches (1)
provided (1)
disseminated (1)
is posting (1)
was stealing (1)
post (1)
multiple breaches (1)
pick up (1)
their data leaked (1)
were then dumped (1)
a 2014 security incident (1)
an even bigger hack (1)
went up (1)
an intrusion (1)
hack attacks (1)
a cyberattack (1)
The most recent breach (1)
exposed in the breach (1)
a database breach (1)
have looted (1)
pull down (1)
crack (1)
looted (1)
the breach (1)
are harvesting (1)
ransacked (1)
was exporting (1)
been a breach (1)
could have accessed (1)
have been attacking (1)
a publicly exposed (1)
can be exposed (1)
The incident (1)
were hacked (1)
the exposed database (1)
stream (1)
can extract (1)
be compromised (1)
intercept and read (1)
obtaining (1)
were harvested (1)
collecting data (1)
breach incident (1)
ata breach” (1)
as stolen (1)
ata breach. (1)
tolen (1)
reaches, (1)
he information stolen (1)
the data leaked (1)
a personal data leak (1)
an unspecified cyber attack (1)
Get access (1)
ata collected (1)
two different incidents (1)
got into (1)
had been shared (1)
was left (1)
collection (1)
leak out (1)
can directly steal (1)
mass harvesting (1)
a sizable database stolen (1)
dumping (1)
are collecting (1)
amassed (1)
cyber-thefts (1)
BEC-related data breaches (1)
theft of sensitive data (1)
disclose (1)
credit card theft (1)
a hacking campaign (1)
the credit card breach (1)
downloading a copy (1)
an email data breach (1)
The initial breach (1)
Data breaches (1)
has intercepted (1)
a deanonymization attack (1)
had been corrupted (1)
eavesdropping (1)
accessible (1)
be intercepted (1)
been accessible (1)
viewed or acquired (1)
illegally accessed (1)
health data breaches (1)
took (1)
access was gained (1)
gain unauthorized access (1)
might steal (1)
were to hack (1)
swipes (1)
has hacked (1)
is leaked (1)
does collect (1)
two or more data breaches (1)
custom information-stealing (1)
corrupt (1)
is obtained (1)
can access (1)
is collected (1)
a larger data breach (1)
hit (1)
the forums hacked (1)
e exposed (1)
ata breaches (1)
copied (1)
siphon (1)
theft is theft (1)
are being stolen (1)
the game stolen (1)
game leaking (1)
been accessed (1)
are leaking (1)
data access (1)
were exposed and leaked (1)
data theft and exfiltration (1)
The data stolen (1)
a security breach (1)
credential- stuffing attacks (1)
credential-stuffing attacks (1)
rab (1)
ere dumped (1)
ata breach, (1)
have stolen and leaked (1)
the ShadowBrokers leak (1)
been exposed (1)
had been exposed (1)
were accessed or stolen (1)
cyber attacks (1)
had compromised (1)
hacks and leaks (1)
massive data dump (1)
btained (1)
rain (1)
drain (1)
was touched (1)
was stolen (1)
this attack (1)
could also access (1)
were harvesting (1)
the massive leak (1)
was never exposed (1)
The leaks (1)
have already leaked (1)
are getting out (1)
have been no leaks (1)
weren't exposed (1)
cyber security breaches (1)
content breaches (1)
can remotely capture (1)
the credit card breaches (1)
have hit (1)
Card breaches (1)
card breaches (1)
a significant breach (1)
publicly released (1)
was also breached (1)
made off (1)
were attacked (1)
a data dump (1)
This specific breach (1)
could exfiltrate (1)
have complete access (1)
downloaded (1)
the leaked (1)
have also secured access (1)
The leaking (1)
would collect (1)
the proprietary info stolen (1)
The Cellebrite breach (1)
siphon off (1)
have been pulled (1)
rip data (1)
are gathering (1)
this new data collection system (1)
The collection (1)
is stolen (1)
has been breaking into (1)
recent incidents (1)
being hacked (1)
have also been exposed (1)
latest dump (1)
likely came (1)
The code dump (1)
gather (1)
PoS threats (1)
The hacking (1)
a lengthy cyber attack (1)
the hacking (1)
a hacking spree (1)
cyber attack (1)
clean up (1)
can steal (1)
were also able to access (1)
incident (1)
were not exposed (1)
new attacks (1)
were intercepted (1)
this most recent breach (1)
the first breach (1)
siphoned track data (1)
second breach (1)
a credit card breach (1)
are selling (1)
the NSA leak (1)
had previously leaked (1)
skimmed (1)
has been a compromise (1)
has been stolen (1)
have likely been pilfered (1)
The data breaches (1)
large data breaches (1)
a personal data breach (1)
the massive dump (1)
were being offered for sale (1)
was illegally obtained (1)
could be accessed (1)
extraction of data (1)
customer data stolen (1)
have been breached (1)
have been able to gain (1)
logging (1)
capturing (1)
spy (1)
has corrupted (1)
have harvested (1)
could steal (1)
are stealing (1)
sought out (1)
had won access (1)
have deep access (1)
snoop over (1)
were released (1)
posting (1)
an unauthorized remote access (1)
has compromised (1)
credential-harvesting attacks (1)
will receive (1)
ere compromised. (1)
as retrieved (1)
ogging (1)
ntercepts (1)
as likely recorded (1)
has been circulating (1)
user data theft (1)
circulating online (1)
The original data breach (1)
did copy (1)
was stolen or exposed (1)
are exposing (1)
grant direct access (1)
various former data breaches (1)
previously stolen (1)
a cyber attack (1)
was also impacted (1)
were able to access (1)
were taken (1)
is compromised (1)
have sold (1)
a past breach (1)
data leaked (1)
haven’t been breached (1)
saved and submitted (1)
their details leaked (1)
shocking breach of data privacy (1)
a fresh data breach (1)
was also accessible (1)
possession (1)
the leaked records (1)
the leak of player information (1)
pull (1)
was not breached (1)
was also hacked (1)
acquire (1)
data breach cybercrime (1)
plunder (1)
having gained access (1)
reviously compromised (1)
ave been obtained (1)
een any breaches (1)
ave access (1)
WikiLeaks’ Vault 7 data dump (1)
the main hack against (1)
circulating (1)
allegedly stolen (1)
left open (1)
be slurped (1)
is being circulated (1)
has been no exposure (1)
exposed in the dump (1)
steal and sell (1)
having been compromised (1)
have been leaked (1)
gain full access (1)
dumps (1)
scraping (1)
essentially performed (1)
snuck (1)
stumble across (1)
has been accessible (1)
has been found exposed publicly (1)
a large data exposure (1)
a massive theft (1)
were accessible (1)
sell (1)
the data theft operations (1)
three separate data breaches (1)
Data Breaches (1)
penetrated (1)
cloud account breach (1)
release (1)
The last access (1)
loss (1)
was "stolen (1)
as not released (1)
as released (1)
eleased (1)
he leak (1)
ault 7 leak (1)
elease (1)
was accessed or exposed (1)
access to steal (1)
has gained access (1)
the data leakage (1)
loss or theft (1)
this leak (1)
gain access and steal (1)
the data leaks (1)
could dump (1)
scoop up (1)
are stolen (1)
have seized (1)
are exporting (1)
inappropriately accessed (1)
was removed (1)
ollect (1)
ain access (1)
rack (1)
re being compromised, (1)
hack exposed (1)
breach (1)
arvesting (1)
ave been viewed (1)
were all exposed (1)
have been hacked (1)
a vendor selling (1)
ave also been gathering (1)
records leaked (1)
may have been breached (1)
will publish (1)
the cyberattack (1)
xtract (1)
ere exposed (1)
have to obtain (1)
data compromise (1)
compromises (1)
as leaked (1)
had breached (1)
Data leaks (1)
is not compromised (1)
was not transferred (1)
ttacks (1)
were damaged or recovered (1)
data loss (1)
eaked (1)
gains access (1)
being breached (1)
their ransacking (1)
the ransacking (1)
will be collected (1)
have gained access (1)
the documents dump (1)
the latest document dump (1)
the external release (1)
were snared (1)
was handed (1)
can read and download (1)
are gaining access (1)
were actually being delivered (1)
The most significant attack (1)
seek out (1)
the data collected (1)
have breached (1)
have been gained (1)
having access (1)
had been taken (1)
allegedly perpetrated (1)
the 2016 attacks (1)
the suspected hack (1)
unauthorized remote access (1)
being captured (1)
The theft (1)
has been leaked (1)
did not breach (1)
was not obtained (1)
hold (1)
was sold (1)
Data compromised (1)
a data leak (1)
a sizable data leak (1)
was viewed or copied (1)
gained (1)
provided access (1)
being made accessible (1)
dispersed (1)
got out (1)
data breach incident (1)
the survey exposed (1)
inadvertently exposed (1)
has been taken (1)
information accessed (1)
were not taken (1)
the data stolen (1)
Attack.Ransom
1585
ransomware attacks (59)
pay (59)
ransom (58)
pay the ransom (51)
ransomware attack (38)
a ransomware attack (37)
paid (37)
demanded (30)
paying (22)
paying the ransom (22)
the attack (21)
pay a ransom (17)
the ransom demand (16)
payments (15)
demands (15)
demand (15)
ransom demands (14)
asked for (14)
hit (13)
payment (13)
ransom demand (12)
attacks (12)
the ransom (12)
the ransomware attack (11)
ransom payments (10)
extort money (10)
extort (9)
demanding payment (9)
WannaCry ransomware attack (7)
demand a ransom (7)
ransom payment (7)
demanding (7)
demanding a ransom (7)
WannaCry (7)
demand payment (7)
paid the ransom (7)
paying a ransom (7)
blackmail (6)
are demanding (6)
Ransomware attacks (6)
demanding ransom (6)
extortion (6)
was attacked (6)
demands a ransom (5)
the ransom is paid (5)
ransomware payments (5)
a ransom is paid (5)
a ransom (5)
attack (5)
pay the ransom demand (5)
asking (5)
paid a ransom (5)
ransom demanded (5)
a ransom demand (5)
need to pay (4)
demand ransom (4)
paid ransom (4)
demands payment (4)
paying up (4)
pay up (4)
be paid (4)
asking for (4)
the ransom payment (4)
ay (4)
WannaCry attack (4)
paying the ransom demand (4)
demanded a payment (4)
WannaCry ransomware attacks (3)
were hit (3)
refused to pay (3)
the attacks (3)
was hit by a ransomware attack (3)
was hit (3)
demanding a ransom payment (3)
pays up (3)
ransomware attack (3)
have to pay (3)
ransomware attack, (3)
held for ransom (3)
emands (3)
The demand (3)
demands money (3)
ansomware attacks (3)
attacked (3)
extorted (3)
ransom is paid (3)
the demands (3)
paying ransom (3)
paid up (3)
demanded a ransom (3)
have been hit (3)
The attack (3)
paid the money (3)
demanded payment (3)
the incident (3)
payment is made (2)
asks for (2)
recent attacks (2)
The attacks (2)
asking for a ransom (2)
The ransom demand (2)
displays (2)
has been hit (2)
asks (2)
disrupting (2)
ask for a ransom (2)
blackmail attempts (2)
are asking for (2)
instruct (2)
a successful ransomware attack (2)
is asking for (2)
the extortion demands (2)
ransomware campaigns (2)
pay the demand (2)
were attacked (2)
pay money (2)
being held to ransom (2)
the Atlanta attack (2)
have demanded (2)
a ransom was paid (2)
a ransom payment (2)
the WannaCry ransomware attack (2)
the cyberattack (2)
The ransomware attack (2)
the ransomware cyber attack (2)
pays (2)
sneaked (2)
demand digital currency (2)
demand the ransom (2)
ask for payments (2)
these attacks (2)
was paid (2)
send (2)
the ransom payments (2)
five ransomware attacks (2)
is costing (2)
ttacks (2)
s demanded. (2)
emand (2)
ask for money (2)
The ransom demands (2)
ransomware demands (2)
the WannaCry attack (2)
payouts (2)
agreed to pay (2)
ask for payment (2)
the ransom demanded (2)
being hit (2)
the WannaCry ransomware outbreak (2)
paid ransoms (2)
had paid the ransom (2)
their ransom demands (2)
ransom was paid (2)
demanding money (2)
has paid the ransom (2)
emanded (2)
was hit with a ransomware attack (2)
paid a fee (2)
shake down (2)
ransom money (2)
WannaCry attacks (2)
This attack (2)
Ransoms (2)
ransoms (2)
has demanded (2)
ransom paid (2)
had to pay (2)
demanded money (2)
ttacks last year, (1)
d or risk hav (1)
ransomware attacks (1)
pay ransom (1)
paying the “ransom” (1)
payment demands (1)
the data being ransomed (1)
the payment demanded (1)
drop asking price (1)
are asked (1)
pay a high penalty (1)
will apparently demand (1)
left behind (1)
paying the ransom demanded (1)
requesting a large ransom (1)
The ransomware demands (1)
the payment demand (1)
his ransom demands (1)
had paid (1)
have paid the ransom (1)
left (1)
pay a ransom fee (1)
demanding the ransom (1)
intrusion (1)
a ransom had been left (1)
the intrusions (1)
cyber extortion (1)
had paid the extortion fee (1)
chatting up (1)
remit bitcoins (1)
pay their ransoms (1)
the malware's ransom demand (1)
never pay ransoms (1)
a payment demand (1)
are instructed to pay (1)
the MongoDB ransomware attacks (1)
a wide ransomware attack (1)
paid out (1)
be extorted (1)
can be demanded (1)
a major attack (1)
pays the ransom (1)
hold computers hostage (1)
have been ransomed (1)
these ransom attacks (1)
online extortion (1)
holding an industrial control system hostage (1)
hold data hostage (1)
extortion-based campaigns (1)
were asked to pay a ransom (1)
refusing to pay (1)
paying the money (1)
has hit (1)
made any payments (1)
directly attacking (1)
would agree to pay (1)
not to pay the ransom (1)
receive (1)
not to pay (1)
pay a ransomware fine (1)
leave (1)
some of the more recent attacks (1)
are demanding a ransom (1)
money is paid (1)
pay the blackmail (1)
demanded in payment (1)
was struck (1)
ask (1)
ransom fee (1)
the ransom collection (1)
is paid (1)
must pay to deactivate (1)
demanded as ransom (1)
The payment demanded (1)
The first ransomware attack (1)
exchange for a payment (1)
displayed (1)
The extortion attempt (1)
demand bitcoin (1)
digital “kidnapping” (1)
Vehicle-enabled ransom (1)
this attack (1)
ransom amount (1)
were expecting (1)
expected as ransom (1)
posted (1)
instructs (1)
paying up the demanded ransom (1)
pay up the ransom (1)
ransomware outage (1)
ransomware cyber-attack (1)
"ransomware" attack (1)
ransom isn’t paid (1)
pay a hefty ransom (1)
the ransom note (1)
ransom note (1)
emands, (1)
ansom (1)
blackmail money (1)
Paying (1)
pay the ransom being demanded (1)
ransomed (1)
WannaCry damage (1)
extortion demand (1)
ransom request (1)
“Wanna Cry” ransomware attack (1)
WannaCry ransomware attacks (1)
WannaCry cyber attack (1)
asked to be paid (1)
WannaCry malware attacks (1)
had demanded (1)
Paying the ransom (1)
ransomware cyberattack (1)
pay out (1)
a similar attack (1)
The incident (1)
did not pay the ransom (1)
has been paid in ransoms (1)
“ransomware” attacks (1)
cyber-extortion attack (1)
WannaCrypt attacks (1)
demanded Bitcoin payments (1)
paying the WannaCry ransom (1)
WannaCrypt attacks (1)
WCry campaign (1)
ransomware worm attack (1)
the WannaCry threat (1)
the WannaCry phenomenon (1)
asks for a ransom (1)
demands a "ransom" (1)
the "WannaCry" ransomware attack (1)
payment demanded (1)
been paid as ransom (1)
a "ransomware" attack (1)
WannaCry ransomware campaign (1)
ransomware cyberattacks (1)
Locky ransomware attacks (1)
ransoms paid (1)
paid out a ransom (1)
requested for (1)
a certain ransom (1)
ended up paying (1)
were infected (1)
the MongoDB attack (1)
have already been paid (1)
the ongoing ElasticSearch attacks (1)
The recent MongoDB attacks (1)
were hit by ransomware attacks (1)
stating the ransom (1)
pays their ransom (1)
asking for bitcoins (1)
a ransomware demand (1)
extortion for money (1)
unconfirmed demands (1)
data extortion (1)
its demands (1)
its blackmail requests (1)
its ransom requests (1)
usually demand (1)
are (were) being extorted (1)
pay a fee (ransom) (1)
solicit extortion money (1)
pay his ransom demand (1)
TDO's extortion (1)
pay a ransom demand (1)
extract ransoms (1)
extort payments (1)
DDoS ransom attacks (1)
those attacks (1)
DDoS-for-Bitcoin ransom attacks (1)
DDoS ransoms (1)
requesting for payments (1)
asking for money (1)
will display (1)
have to pay up (1)
receives (1)
the demand for payment (1)
Internet extortion (1)
ransomware attack. (1)
he ransom wasn’t paid, (1)
xtorting (1)
ould have to pay up. (1)
he ransom demand (1)
old for ransom, (1)
e extorted to pay, (1)
ansomware attacks— (1)
ay up: (1)
three ransomware attacks (1)
a ransom isn't paid (1)
money is demanded (1)
kidnapping (1)
kidnapping for ransom (1)
Ransomware online extortion schemes (1)
demanding cash (1)
are willing to pay the ransom (1)
pay the extortion (1)
a ransomware campaign (1)
their most recent ransomware attack (1)
demanding large ransoms (1)
launching ransomware attacks (1)
a recent ransomware attack (1)
would pay (1)
would pay a ransom (1)
provide (1)
aid a ransom (1)
paying a “fine” (1)
extort fees (1)
forced them to offer (1)
used ransomware to steal (1)
ransom attacks (1)
a cyber-ransom campaign (1)
extortion scheme (1)
give (1)
a real ransomware attack (1)
made their ransom (1)
leave their own (1)
would leave (1)
a ransom note demanding (1)
asking for payment (1)
doesn’t pay (1)
the sum demanded (1)
the extortion attempt (1)
extortion attempts (1)
a ransom scheme (1)
extort more money (1)
xtortion efforts. (1)
xtort (1)
had been hit (1)
demand even higher ransom payouts (1)
Ransomware Attacks (1)
empty ransomware demands (1)
extortion attacks (1)
should never pay ransoms (1)
ransoms collected (1)
The extortion (1)
ransomware campaign (1)
a ransom was apparently paid (1)
offered (1)
the payment was made (1)
paid the demanded ransom (1)
making the payment (1)
a ransomware-type malware attack (1)
can pay ransoms (1)
a request for payment (1)
having to pay (1)
the high ransom demanded (1)
ransomware' attacks (1)
The cyber attack (1)
seeking ransom (1)
the demands of ransom (1)
demands ransom (1)
has been hit by a ransomware attack (1)
their demands (1)
are demanding payment (1)
ransoms should not be paid (1)
payment of a ransom (1)
is being demanded (1)
was requested (1)
requested payment (1)
would not be paying the ransom (1)
are now demanding (1)
have attacked (1)
hit by ransomware (1)
received (1)
hit by ransomware attacks (1)
demand money (1)
negotiated (1)
was told to deposit (1)
notifying (1)
the Samsam ransomware attack (1)
a demand for a sum of money (1)
encounter (1)
were knocked out (1)
have been paying the ransoms (1)
are paying ransoms (1)
the Mongo Lock campaign (1)
the new Mongo Lock campaign (1)
a cyberattack (1)
paid its ransom (1)
the demand (1)
demanded payments (1)
ransom proceeds (1)
demanded ransom (1)
assault (1)
paid any ransom (1)
pay higher ransom fees (1)
the ransom fees demanded (1)
asked (1)
dropped (1)
Attacks (1)
WannaCry hit (1)
discourage payments (1)
get paid (1)
had to send payment (1)
this incident (1)
demanding ransomware payments (1)
pay a cryptocurrency ransom (1)
the same ransomware attack (1)
been hit (1)
set up (1)
pay a larger ransom (1)
“ransomware” cyberattack (1)
disrupted (1)
was demanded (1)
has paid a ransom (1)
pays a ransom (1)
two ransomware attacks hit (1)
demands to pay bitcoin (1)
payment demand (1)
sk for more money. (1)
hould never pay a ransom (1)
he WannaCry ransomware attack (1)
demand was made (1)
ransomware’ attacks (1)
cyberattacks (1)
process payment (1)
drops (1)
gets hit (1)
he attack, (1)
ay a ransom, (1)
he attack. (1)
ransom demand (1)
ransom is paid. (1)
ansomware attack (1)
ave demanded (1)
emand payment (1)
an option to pay (1)
a pay-per-computer option (1)
ransoming (1)
be hit (1)
demanded another payment (1)
pay ransoms (1)
pay ransom demand (1)
force (1)
make a payment (1)
were impacted (1)
demand a ransom payment (1)
paying any ransom (1)
Paying a ransom (1)
payment is received (1)
isn’t paying (1)
must send (1)
ransom has been requested (1)
asked for Bitcoin (1)
demanding Bitcoin (1)
a cyber attack (1)
Ransom (1)
costing (1)
hat attack (1)
ayment (1)
emanding (1)
ansom request (1)
ansom, (1)
emand payment, (1)
deposit the requested amount (1)
will pay the ransom (1)
hitting (1)
paying the Monero ransom (1)
a heavy attack (1)
extortions (1)
RDoS campaigns (1)
ransom DDoS (RDoS) (1)
paid a ransom fee (1)
is asking (1)
pay a double ransom (1)
are disproportionately impacted (1)
paying ransomware (1)
been paid (1)
the payment (1)
request (1)
pay ransom demands (1)
the cyber attacks (1)
as forced (1)
eing paid (1)
ayments (1)
harge (1)
heir demands. (1)
xtortion, (1)
s now demanding (1)
ay the fee. (1)
ayment demands (1)
ill pay up (1)
emands a payment (1)
re demanding (1)
amSam ransomware attacks (1)
pay any ransom (1)
initial request (1)
a new ransom demand (1)
devastated (1)
paying the ransomware amount (1)
send the requisite Bitcoins (1)
the latest cyberattack (1)
ransomware attack demanding Bitcoin (1)
the Jaff campaign (1)
want a payment (1)
an ambitious ransom (1)
its ransom demands (1)
cyber-attack (1)
deploying (1)
rejected a demand for money (1)
receipt of a ransom (1)
making a payment (1)
the “unprecedented” attack (1)
demands for money (1)
paying money (1)
emanding ransoms (1)
it (1)
he attack (1)
ansom demands. (1)
Paying ransomware (1)
make the final payment (1)
already paid (1)
the WannaCry ransomware attacked (1)
an attack (1)
payout for a ransomware attack (1)
got the payment reduced (1)
have pulled off (1)
WannaCry only demanded (1)
payment amount (1)
payment scheme charges (1)
charge (1)
The average ransom demand (1)
ask for the payment (1)
the payment wasn't received (1)
payments were made (1)
demanding a payment (1)
collecting ransoms (1)
is then demanded (1)
A demand (1)
the demand for ransom (1)
money extorted (1)
the ransomware hit (1)
attacking (1)
The WannaCry epidemic hit (1)
their ransom payments (1)
the global cyberattack (1)
WannaCry cyberattack (1)
ransom fees (1)
ransom money paid (1)
paid the online fee (1)
has been deposited (1)
has paid the digital fees (1)
deposit the ransom (1)
handing over money (1)
Extortion really pays (1)
higher ransoms (1)
paid off (1)
The highest demand (1)
paying off (1)
not pay up (1)
getting hit (1)
ransomware incidents (1)
the ransom demands (1)
a global cyberattack (1)
a very large ransom payment (1)
is selling the decryption key (1)
the ransom is not paid (1)
payment is not made (1)
RansomWeb (1)
have been held for ransom (1)
have hit (1)
MongoDB attacks (1)
holding their ransom (1)
ransom sum (1)
the ransom will be paid (1)
the money is paid (1)
are seeking a whole lot of money (1)
receive the payment (1)
a payment has been made (1)
held to ransom (1)
ransom (1)
he demand for payment (1)
eld to ransom (1)
pay a fine (1)
payment was not received (1)
be blackmailed (1)
accept (1)
their extortion efforts (1)
the global WannaCry attacks (1)
the ransom requested (1)
the Wanna Decryptor attack (1)
The WannaCry attack (1)
do pay the ransom (1)
will not pay the ransom (1)
payment has been demanded (1)
demands a fee (1)
The assault (1)
money was paid (1)
The extortion threat (1)
Pays Ransom (1)
paying ransoms (1)
are holding for ransom (1)
paying a small ransom (1)
had been held hostage (1)
has paid (1)
The ransom (1)
money that was requested (1)
ransom was demanded (1)
Attack.Phishing
1562
trick (84)
phishing attacks (52)
phishing (49)
lure (34)
pretending to be (25)
send (25)
phishing scams (24)
claiming to be (19)
posing as (19)
sending (18)
sent (18)
disguised as (16)
phishing campaigns (14)
spoofing (13)
received (13)
phishing scam (13)
tricking (12)
look like (11)
impersonating (11)
fool (10)
Phishing (10)
poses as (9)
purporting to be (9)
phishing campaign (9)
were sent (9)
The attack (8)
entice (8)
dupe (8)
attacks (8)
pretend to be (8)
impersonate (8)
as bait (7)
mimic (7)
receive (7)
masquerading as (7)
a phishing scam (7)
designed to look like (7)
the phishing attack (6)
looks like (6)
a phishing attack (6)
phishing attempts (6)
coming from (6)
tricks (6)
spoof (6)
spear-phishing (6)
posed as (6)
spear phishing (6)
spoofed (6)
phish (5)
displays (5)
phishing attack (5)
pose as (5)
come from (5)
lures (5)
convincing (5)
take the bait (5)
pretended to be (5)
pretends to be (5)
tricked (5)
appears to be (5)
looked like (5)
are sent (5)
the phishing campaign (4)
BEC (4)
Phishing attacks (4)
convince (4)
receives (4)
made to look like (4)
lured (4)
the attacks (4)
set up (4)
is sent (4)
were sent from (4)
these attacks (4)
created (4)
sent to (4)
claim to be (4)
BEC scams (3)
came from (3)
claimed (3)
is disguised as (3)
the attack (3)
was sent (3)
disguise (3)
the campaign (3)
rick (3)
BEC attacks (3)
Business Email Compromise (BEC) attacks (3)
appear to be (3)
Phishing scams (3)
claims to be (3)
was tricked (3)
masquerade as (3)
use (3)
hishing (3)
the scam (3)
comes from (3)
attract (3)
receiving (3)
forged (3)
the phishing attacks (3)
deceived (3)
sending out (3)
are sending (3)
the phishing scam (3)
email phishing scams (3)
email scam (3)
a phishing campaign (3)
fooling (3)
came in (2)
phishing threats (2)
imitating (2)
rogue (2)
an email scam (2)
start (2)
ynamite phishing" (2)
ricked (2)
reating (2)
spread (2)
looks exactly like (2)
be tricked (2)
get (2)
The phishing attack (2)
the phish (2)
circulated (2)
appeared to come from (2)
A massive phishing campaign (2)
were hit (2)
that attack (2)
decoy (2)
had received (2)
These attacks (2)
the UK attack (2)
the BEC attacks (2)
fabricate (2)
were phishing (2)
being sent out (2)
pretending (2)
attack (2)
phishing schemes (2)
being sent (2)
crafting (2)
craft (2)
are tricked (2)
fall for the bait (2)
A phishing campaign (2)
link-baiting phishing attacks (2)
were sent out (2)
appear (2)
clone (2)
appear to come from (2)
fake (2)
appears as (2)
fooled (2)
fall (2)
directs (2)
are sending out (2)
trap (2)
is designed (2)
this phishing attack (2)
a spear phishing attack (2)
sends (2)
deceive (2)
a WhatsApp scam (2)
came (2)
contact (2)
look just like (2)
appears to come from (2)
scam (2)
has masqueraded as (2)
create (2)
send out (2)
phishing scheme (2)
disguised to look like (2)
phishes (2)
this phishing campaign (2)
appears (2)
pretend (2)
are receiving (2)
duped (2)
osing as (2)
were presented as if coming from (2)
creating (2)
claim (2)
sent out (2)
have received (2)
business email compromise (2)
were sent to (2)
falsely appeared (2)
had come from (2)
business email compromise (BEC) (2)
the airline phishing attack (2)
crafted (2)
an email phishing scam (2)
claimed to be (2)
an attack (2)
was defrauded (2)
being tricked (2)
phone-based fraud (1)
email-related fraud (1)
this scam (1)
forward the scam (1)
bait-and-switch campaigns (1)
serve up (1)
tailor (1)
bait-and-switch (1)
perfectly mirrors (1)
lull (1)
The new campaign (1)
new tactics (1)
The newly reported incidents (1)
are posing as (1)
purportedly from (1)
The attacks (1)
An attack (1)
A new phishing campaign (1)
sent from (1)
The initial phishes (1)
Dynamite Phishing (1)
start sending out (1)
distributing (1)
this new campaign (1)
are attacking (1)
this new WhatsApp scam (1)
are being circulated (1)
this campaign (1)
benign (1)
was disguised as (1)
present (1)
is prompted (1)
have been modified (1)
mimics (1)
purporting (1)
Attacks (1)
have posed as being (1)
pear phishing attacks. (1)
imitates (1)
an email phishing malware attack (1)
is duping (1)
Coming from (1)
phishing email scams (1)
been sending out (1)
have appeared (1)
expert phishing attacks (1)
be prompted (1)
invite (1)
has created (1)
was booby-trapped (1)
The January attacks (1)
This attack (1)
business email spoofing (BES) (1)
Sending (1)
spoofing scams (1)
dual-phishing scam (1)
masked as (1)
was later repackaged as (1)
was originally designed as (1)
received emails purportedly (1)
other phishing attempts (1)
phishing lures (1)
phishing-related activities (1)
campaigns (1)
the phishing campaigns (1)
angler phishing (1)
a spear phishing email attack (1)
look almost like (1)
incident (1)
The phishing (1)
Spear Phishing (1)
BEC attack (1)
an email phishing (1)
spear phishing attacks (1)
phishing emails (1)
spoofed to imitate (1)
the same attack (1)
pushing (1)
the latest attacks (1)
simulated phishing attacks (1)
single BEC scam (1)
ruse (1)
pretend to provide (1)
is misled (1)
are exploiting (1)
a common trick (1)
displayed (1)
was portraying itself as (1)
scareware rogue (1)
perform (1)
a massive spam attack (1)
started as (1)
Once baited (1)
rogue security software (1)
distribute (1)
shows (1)
a Phishing attack (1)
purportedly coming from (1)
spear-phishing campaign hitting (1)
is well-tailored (1)
the security incident (1)
spear phishing attack (1)
the CloudPhishing fan-out (1)
delivered (1)
The CloudPhishing fan-out effect (1)
CloudPhishing (1)
CloudPhishing Fan-out Effect (1)
claim as (1)
fake downloads (1)
opens up (1)
designed to look exactly like (1)
Email spam campaigns (1)
a typical WhatsApp scam (1)
were tricked (1)
this latest scam campaign (1)
WhatsApp scam (1)
as baits (1)
the WhatsApp scam (1)
were bait-and-switched (1)
the scam campaign (1)
That scam (1)
a fast-spreading WhatsApp scam (1)
was tracking (1)
phishing attacks (1)
were planning (1)
used (1)
have send (1)
This phishing technique (1)
has recently received (1)
is hitting (1)
An effective new phishing attack (1)
pretended to have come from (1)
was sent out (1)
purports (1)
are coming from (1)
spoofed to look like (1)
misdirection (1)
fraud (1)
cajole (1)
spam out (1)
come (1)
claiming (1)
attack tricked (1)
wider spread (1)
tempting (1)
phishing email schemes (1)
have circulated (1)
The phishing scheme (1)
email phishing scheme (1)
ynamite phishing campaign (1)
imicked (1)
ruse was convincing (1)
is redirected (1)
hit (1)
the massive phishing attack (1)
seemed to come from (1)
were attacked (1)
A phishing email attack (1)
are taken (1)
a sophisticated phishing campaign (1)
have been circulating (1)
Similar Google Docs scams (1)
This phish (1)
this phish (1)
phishing defense (1)
this particular phish (1)
impersonates (1)
A nasty phishing scam (1)
was actually sent (1)
titled (1)
first hit (1)
last summer’s attacks (1)
traditional phishing attacks (1)
purport to be from (1)
further distribute (1)
has simply named (1)
OAUTH phishing attacks (1)
Today's phish (1)
the Pawn Storm phish (1)
The phish (1)
a well-disguised phishing attack (1)
phishing spree (1)
Tuesday's phishing scheme (1)
was also sent (1)
Tuesday's phishing attack (1)
have built (1)
Tuesday’s attack (1)
have been fooled (1)
appeared to be (1)
invited (1)
a sneaky email phishing attack (1)
the spam campaign (1)
prompts (1)
spear-phishing campaigns (1)
instructs (1)
was crafted (1)
email phishing campaigns (1)
was purportedly sent (1)
forges (1)
"phishing" attacks (1)
had been hit (1)
phish additional data (1)
the most phishing attempts (1)
would craft (1)
the use of spearphishing (1)
the phishing scheme (1)
operates (1)
can fool (1)
build (1)
has used (1)
slinging (1)
is designed to scare (1)
randomly sending (1)
presents (1)
will attempt (1)
come with (1)
misleading (1)
portrayed itself as (1)
resembles (1)
provide (1)
explicitly named (1)
attractive lures (1)
would be taken (1)
follow (1)
are particularly tricky (1)
prompting (1)
abuses (1)
set up new phishing (1)
were crafted (1)
designed to resemble (1)
a "spear-phishing" campaign (1)
got tricked (1)
a vishing attack (1)
designed (1)
new LinkedIn scam (1)
plays (1)
appears to be real (1)
pushes (1)
the setting up (1)
encourages (1)
disguised (1)
set on convincing (1)
trying to trick (1)
Netflix phishing campaigns (1)
Phishing campaigns (1)
The campaign (1)
been a recent lull (1)
was disguised (1)
booby-trapped (1)
his attack (1)
urports to be (1)
hishing attacks, (1)
ailor (1)
laims (1)
mpersonates (1)
hishing attack (1)
hishing attack. (1)
upe (1)
imicking (1)
follow-up phishing attacks (1)
a “phishing” scheme (1)
is tracking (1)
email-based phishing campaigns (1)
Recent phishing campaigns (1)
seemingly coming from (1)
Business E-Mail Compromise (1)
were not sent (1)
received from (1)
are purporting to be (1)
have been sent out (1)
publishing (1)
is packaged as (1)
outfitted (1)
requires (1)
perform bogus diagnostics (1)
is persuaded (1)
was spoofed (1)
spear phishing email attacks (1)
tailor messaging (1)
whaling attacks (1)
the most dangerous email scams (1)
BEC (Business Email Compromise) attacks (1)
The Phishing attacks (1)
defrauding (1)
granting (1)
have been contacting (1)
loaded (1)
The deface message (1)
has received (1)
is urged (1)
claims (1)
redirects (1)
luring (1)
is encouraged (1)
claims to contain (1)
Mimicking (1)
is chosen to be (1)
this attack (1)
crafting the attacks (1)
persuade (1)
were redirected (1)
disguise themselves as (1)
‘phishing’ scam (1)
be taken (1)
disguising as (1)
closely resemble (1)
misappropriating the familiar (1)
is lured (1)
pretend to represent (1)
a social media phishing scam (1)
can pretend to be (1)
pretending to come from (1)
Take the bait (1)
post (1)
are creating (1)
their spear-phishing (1)
purported to come (1)
tax-themed phishing scams (1)
Tax-themed phishing scams (1)
can dupe (1)
purport to be (1)
crafted to look very much like (1)
get duped (1)
mimicked (1)
being tailored (1)
an Angler phishing campaign (1)
will be tricked (1)
be imitated (1)
being spoofed (1)
being lured (1)
MEWKit (1)
was mimicked (1)
has picked up (1)
deceives (1)
deluding (1)
claim form (1)
leads (1)
claims to come from (1)
this new scam (1)
are fooled (1)
The lure (1)
This scam (1)
manipulate (1)
approach (1)
A NEW DVLA car tax scam (1)
scams pretending to be (1)
latest scam (1)
been sent (1)
look to be (1)
are being sent (1)
a sophisticated new scam (1)
the largest phishing operation (1)
place links (1)
imitate (1)
he phishing (1)
eceive (1)
reate (1)
uild (1)
eing phished (1)
triggers (1)
the latest CFO job lure (1)
bearing (1)
lure phishing attacks (1)
the lure (1)
spear-phishing campaign (1)
falls (1)
ad created (1)
hishing attacks. (1)
urported to come from (1)
ere presented (1)
ave been phishing (1)
will tempt (1)
bait (1)
are impersonating (1)
created to mirror (1)
spear phishing cyberattacks (1)
The successful trick (1)
were impersonated (1)
duped out (1)
will contact (1)
hook (1)
could scam (1)
purports to be (1)
appearing (1)
This phishing attack (1)
has been masquerading as (1)
offer (1)
attacked (1)
the most phishing attacks (1)
were frequently faked (1)
these scams (1)
further trick (1)
labeled (1)
are duping (1)
could send (1)
could forge (1)
a spear phishing campaign (1)
potentially sent over (1)
arrived (1)
had sent out (1)
claimed to provide (1)
skinned to look like (1)
showing fake alerts (1)
having been sent (1)
has been flinging (1)
A new attack campaign (1)
answered back (1)
was sharing (1)
posted on (1)
were coming from (1)
leading (1)
were aimed (1)
was coming from (1)
the phishing attempts (1)
spear-phishing attempts (1)
urging (1)
sends out (1)
a phishing attempt (1)
pretending to come (1)
laiming to be (1)
ent (1)
n email phishing scam. (1)
claiming to be from (1)
the impersonation (1)
gets through (1)
contacting (1)
phishing methods (1)
spear-phising attacks (1)
emails (1)
opened (1)
be fooled (1)
masquerades (1)
were convinced (1)
Smishing messages (SMS + fishing) (1)
a ‘smishing’ scam (1)
advises (1)
be taken to (1)
the phishing incident (1)
are described as (1)
described as (1)
business email compromise scams (1)
“phishing” scam (1)
bilked (1)
purportedly posed as (1)
had been tricked (1)
an email phishing scam attack (1)
have forged (1)
were conned out (1)
conned (1)
forging (1)
purported to be from (1)
been tricked (1)
an email phishing attack (1)
a malware phishing attack (1)
are being received (1)
phished (1)
will spoof (1)
W-2 scams (1)
got caught (1)
received what looked like (1)
be sent (1)
redirect (1)
be sent from (1)
Fraudster email attacks (1)
A recent phishing scam (1)
are coming directly from (1)
draft (1)
spear-phishing attacks (1)
the spear phishing campaign (1)
personalize (1)
pretend to be sent from (1)
a phishing scheme (1)
emailed (1)
The fraud (1)
these phishing scams (1)
designed to bait (1)
Vulnerability-related.PatchVulnerability
1417
released (69)
patched (64)
fix (60)
fixed (52)
address (37)
patch (33)
patching (26)
addressed (25)
issued (23)
has released (21)
upgrade (18)
update (18)
was fixed (16)
fixing (15)
has patched (15)
release (15)
addresses (14)
available (14)
addressing (13)
fixes (12)
patches (12)
was patched (12)
has fixed (11)
apply (11)
has issued (10)
were fixed (9)
get (9)
is available (9)
pushed (8)
received (8)
has been patched (8)
mitigate (8)
rolling out (7)
updating (7)
updated (7)
resolved (7)
provided (7)
releasing (6)
plug (6)
was released (6)
install (5)
rolled out (5)
were patched (5)
mitigated (5)
issue (5)
resolve (5)
been patched (5)
have been fixed (5)
to patch (4)
the release (4)
were addressed (4)
be patched (4)
releases (4)
have been patched (4)
was addressed (4)
installing (4)
have received (4)
pushed out (4)
correct (4)
updates (4)
receive (4)
have released (4)
are patched (3)
are updated (3)
be fixed (3)
offered (3)
ix (3)
provides (3)
made (3)
applied (3)
has been fixed (3)
recommends (3)
has resolved (3)
plugged (3)
are available (3)
being patched (3)
failed to patch (3)
be available (3)
issuing (3)
delivered (3)
can update (3)
deliver (3)
provide (3)
been fixed (3)
put out (3)
remedy (3)
have applied (3)
mitigating (3)
upgrading (3)
be addressed (2)
are currently available (2)
push out (2)
are already patched (2)
will be addressing (2)
rectified (2)
have been released (2)
had been fixed (2)
be released (2)
being fixed (2)
will provide (2)
ddresses (2)
was published (2)
as fixed (2)
unpatched (2)
is out (2)
have resolved (2)
has been released (2)
has been addressed (2)
tackled (2)
were resolved (2)
did not address (2)
left unpatched (2)
as released (2)
had issued (2)
nstall (2)
come with (2)
has yet to be patched (2)
will arrive (2)
has since been patched (2)
has received (2)
is currently developing (2)
delivering (2)
has developed (2)
are being developed (2)
comes (2)
is releasing (2)
has rolled-out (2)
should be patched (2)
seal (2)
be providing (2)
developing (2)
create (2)
announced (2)
be applied (2)
were deployed (2)
have been issued (2)
have patched (2)
deploying (2)
can fix (2)
has come up (2)
applying (2)
has been available (2)
be made available (1)
Most bug fixes (1)
upgrade to (1)
will fix (1)
are still unpatched (1)
had also patched (1)
monthly security update release (1)
does not apply (1)
was deployed (1)
were able to patch (1)
needs to apply (1)
were running (1)
required patching (1)
to fix (1)
implement any fixes (1)
temporarily fix (1)
the release of the update (1)
was soon created (1)
secretly fixes (1)
ostensibly fixing (1)
implemented a patch (1)
fixes are available (1)
were going to fix (1)
posting (1)
arrange (1)
handle the patching process (1)
will be released (1)
be offered (1)
close the loopholes (1)
have just been given (1)
has worked to correct (1)
completely fix (1)
start deployment (1)
had been patched (1)
are installed (1)
are released (1)
has now issued (1)
did make (1)
does not fix (1)
will be removed (1)
will push that fix (1)
is expected (1)
has been implemented (1)
were being developed (1)
available for download (1)
Providing (1)
push (1)
are fully patched (1)
already patched (1)
is pushed (1)
were updated (1)
issues (1)
created (1)
is supplied (1)
ixed, (1)
itigate (1)
ddress (1)
offer (1)
is yet to patch (1)
has been plugged (1)
roll it out (1)
has prepared (1)
should patch (1)
also fixed (1)
quickly fixed (1)
were all unpatched (1)
the patching (1)
make (1)
performed (1)
did not patch immediately (1)
would be distributed (1)
could have created (1)
the recommended changes (1)
could have fixed (1)
definitely fixed (1)
was pushed out (1)
plugging (1)
could fix (1)
is issued (1)
is being worked on (1)
distributing (1)
being created (1)
didn't merit (1)
had patched (1)
had already fixed (1)
ur fix addresses (1)
ot patched (1)
atch (1)
atched (1)
till unpatched, (1)
ully up to date, (1)
idn't include (1)
ssues (1)
id not patch (1)
ere all patched (1)
as addressed (1)
re already patched (1)
ame (1)
as already issued (1)
our next release (1)
will be addressed (1)
has been unpatched (1)
patching plans (1)
was coming (1)
oll out (1)
as now been resolved (1)
will be patched (1)
have resulted (1)
remained unpatched (1)
its monthly release (1)
will issue (1)
will be fixed (1)
immediately fixed (1)
was applied (1)
has yet to be issued to fix (1)
have yet been issued to address (1)
guerrilla patching (1)
step in (1)
has not fixed (1)
appear to address (1)
the announced fixes (1)
get patched up (1)
a bug fixing (1)
security fixes (1)
patches up to date (1)
have already fixed (1)
has to apply (1)
implemented (1)
have already issued (1)
comes out (1)
hasn't been fixed (1)
remain unfixed (1)
makes patch management (1)
introduced (1)
hasn’t pushed it out (1)
has apparently already prepared (1)
have still not been patched (1)
be resolved (1)
need fixing (1)
developed (1)
being released (1)
develop (1)
should immediately install (1)
have been resolved (1)
have also been released (1)
has rolled out (1)
has not patched (1)
were made available (1)
has been rolled-out to be downloaded (1)
has also released (1)
has released (1)
be included (1)
appeared (1)
has already published (1)
recommended (1)
replace (1)
brings (1)
pulled on (1)
be downloaded (1)
does fix (1)
are only available (1)
prompting (1)
appear in (1)
contain (1)
urged to update (1)
has updated (1)
have been issued to address (1)
ddressed (1)
ixed (1)
eleased (1)
as released. (1)
as issued (1)
pdate (1)
is probably concealing (1)
will soon be replaced (1)
have been integrated (1)
was updated (1)
was developed (1)
adds (1)
has recently fixed (1)
having posted (1)
dropping (1)
running (1)
are committed to issuing (1)
will be updated (1)
creating (1)
has already rolled out (1)
has not been patched (1)
as resolved (1)
has since been fixed (1)
Installing (1)
installed (1)
Released (1)
putting (1)
got (1)
approach (1)
missed (1)
does indeed fix (1)
have not mentioned (1)
have fixed (1)
had fixed (1)
has failed to address (1)
would not get (1)
has also been patched (1)
are generally available (1)
has now been patched (1)
get out (1)
never patched (1)
modifying (1)
has also provided (1)
has also fixed (1)
has plugged (1)
circulating (1)
weren't fixed (1)
has pushed (1)
improves (1)
has also separately released (1)
has been resolved (1)
have all been patched (1)
was also resolved (1)
impacts (1)
were squashed (1)
has had to pull (1)
might be arriving (1)
has been removed (1)
was yanked (1)
pull (1)
was sealed up (1)
is working on (1)
has withdrawn (1)
hasn't updated (1)
did fix (1)
has secretly patched (1)
has been fully patched (1)
is not yet patched (1)
has been backported (1)
the PR fixing (1)
as fixed. (1)
ave removed (1)
need to update (1)
will block (1)
tried to stop (1)
failed (1)
trickled down (1)
trickle down (1)
has delivered (1)
apparently fixed (1)
now patched (1)
build (1)
have also been resolved (1)
are resolved (1)
was then pushed (1)
receiving (1)
the patch released (1)
has addressed (1)
will resolve (1)
hasn’t released (1)
without fixing (1)
failed to issue (1)
will get (1)
a failed patching (1)
having to patch (1)
bug fixes (1)
were released (1)
een patched (1)
s reportedly working (1)
s available (1)
nstalling (1)
an resolve (1)
does bring (1)
The update (1)
will be releasing (1)
has now revealed (1)
mitigated by updating (1)
will address (1)
as also updated (1)
emediate (1)
pgrade (1)
protected against (1)
don’t have (1)
are receiving (1)
this update (1)
swatted (1)
This update (1)
will be labeled (1)
will be present (1)
applies to (1)
was approved (1)
will update (1)
being unpatched (1)
advisory released (1)
has yet issue (1)
will also be released (1)
can be patched (1)
be sending (1)
cannot be fixed (1)
have been addressed (1)
is addressing (1)
take place (1)
a fully-patched 64-bit Windows 10 system (1)
has since addressed (1)
have already been fixed (1)
had not been patched (1)
Critical Patch Released (1)
has shipped (1)
has spared (1)
these kinds of incidents (1)
have since fixed (1)
paused (1)
vulnerability patched (1)
solve (1)
posting updates (1)
has also been released (1)
has not been released (1)
will likely patch (1)
are already releasing (1)
were issued (1)
are going to patch (1)
has also patched (1)
has now pulled (1)
plans to address (1)
have been delivered (1)
be released publicly (1)
begin releasing (1)
being released publicly (1)
lack of updates (1)
the lack of updates (1)
was unpatched (1)
automatically update (1)
have been updating (1)
have not been patched (1)
have not yet patched (1)
were both released (1)
The biggest issue patched (1)
containing (1)
has already patched (1)
will be made (1)
have already been made (1)
will be available (1)
has been quietly patched (1)
should be released (1)
pushing (1)
had not fixed (1)
updated release (1)
need to apply (1)
impact (1)
hurried out (1)
has posted (1)
this fix (1)
automatically receive (1)
is being released (1)
does not address (1)
has been deemed (1)
has published (1)
come (1)
should be fixed (1)
have been made (1)
would post (1)
does come (1)
a fixed patching schedule (1)
has emitted (1)
be rolling out (1)
ix. (1)
ill be deploying (1)
eployed (1)
eveloped (1)
orrected (1)
as just fixed (1)
as now been patched, (1)
its release (1)
included (1)
will be coming (1)
arrive (1)
turns out (1)
come after (1)
grab and install (1)
close (1)
blew (1)
counter (1)
emitted (1)
un-patched (1)
kill off (1)
distribute (1)
be delivered (1)
be patching (1)
be issuing (1)
plugs (1)
is pushing out (1)
have been sealed (1)
were applied (1)
shared (1)
prevent (1)
prepare (1)
go public (1)
is patched (1)
patched or unpatched (1)
will reach (1)
has promised (1)
develop and release (1)
implement (1)
have been applied (1)
ade available (1)
has been rolling out (1)
pdating (1)
lug (1)
advisory published (1)