TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Key insights from analyzing data breaches and cyber-attacks of 2018

52 点作者 zinssmeister超过 6 年前

3 条评论

tptacek超过 6 年前
I don&#x27;t think these kinds of surveys are (1) accurate or (2) particularly useful, but the gold standard for this kind of stuff is the Verizon DBIR:<p><a href="https:&#x2F;&#x2F;enterprise.verizon.com&#x2F;resources&#x2F;reports&#x2F;dbir&#x2F;" rel="nofollow">https:&#x2F;&#x2F;enterprise.verizon.com&#x2F;resources&#x2F;reports&#x2F;dbir&#x2F;</a>
评论 #19103636 未加载
ericalexander0超过 6 年前
<a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;securitybreach&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;securitybreach&#x2F;</a><p>Sub-reddit for cataloging breaches with detail relevant to defenders.
refunperson超过 6 年前
The article notes that the number of &quot;AI&#x2F;ML hacking tools&quot; has grown -- is there documented use of malicious actors using AI as part of campaigns? I&#x27;ve seen researchers publish tools that would likely fall into this space, but I&#x27;m curious if there&#x27;s any known usage of these or other tools for malicious ends.