TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Key insights from analyzing data breaches and cyber-attacks of 2018

52 pointsby zinssmeisterover 6 years ago

3 comments

tptacekover 6 years ago
I don&#x27;t think these kinds of surveys are (1) accurate or (2) particularly useful, but the gold standard for this kind of stuff is the Verizon DBIR:<p><a href="https:&#x2F;&#x2F;enterprise.verizon.com&#x2F;resources&#x2F;reports&#x2F;dbir&#x2F;" rel="nofollow">https:&#x2F;&#x2F;enterprise.verizon.com&#x2F;resources&#x2F;reports&#x2F;dbir&#x2F;</a>
评论 #19103636 未加载
ericalexander0over 6 years ago
<a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;securitybreach&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;securitybreach&#x2F;</a><p>Sub-reddit for cataloging breaches with detail relevant to defenders.
refunpersonover 6 years ago
The article notes that the number of &quot;AI&#x2F;ML hacking tools&quot; has grown -- is there documented use of malicious actors using AI as part of campaigns? I&#x27;ve seen researchers publish tools that would likely fall into this space, but I&#x27;m curious if there&#x27;s any known usage of these or other tools for malicious ends.