Follow the Data: Dissecting Data Breaches and Debunking Myths
Common Information
Type | Value |
---|---|
UUID | 8a5f1cdc-7314-4ee1-bc6f-778d43d26ea4 |
Fingerprint | fdbff4a65c283118657c12e8133ffb34df67753d9a37407de2eee3f460381c11 |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | Sept. 28, 2015, 6:07 p.m. |
Added to db | April 14, 2024, 11:51 a.m. |
Last updated | Aug. 30, 2024, 11:04 p.m. |
Headline | Follow the Data: Dissecting Data Breaches and Debunking Myths |
Title | Follow the Data: Dissecting Data Breaches and Debunking Myths |
Detected Hints/Tags/Attributes | 205/3/99 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://documents.trendmicro.com/assets/wp/wp-follow-the-data.pdf |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 9 | www.privacyrights.org |
|
Details | Domain | 2 | www.healthcareinfosecurity.com |
|
Details | Domain | 54 | www.scmagazine.com |
|
Details | Domain | 138 | www.darkreading.com |
|
Details | Domain | 1 | saiglobal.com |
|
Details | Domain | 2 | khc.sourceforge.net |
|
Details | Domain | 15 | research.microsoft.com |
|
Details | Domain | 2 | www.exploreanalytics.com |
|
Details | Domain | 2 | verizonenterprise.com |
|
Details | Domain | 202 | krebsonsecurity.com |
|
Details | Domain | 2 | www.rcmp-grc.gc.ca |
|
Details | Domain | 5 | www.vanityfair.com |
|
Details | Domain | 84 | www.forbes.com |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 151 | www.bbc.com |
|
Details | Domain | 1 | www.trendmicro.ca |
|
Details | Domain | 3 | www.irishtimes.com |
|
Details | Domain | 1 | credit.com |
|
Details | Domain | 2 | www.credit.com |
|
Details | Domain | 18 | www.eweek.com |
|
Details | Domain | 66 | www.washingtonpost.com |
|
Details | Domain | 5 | www.theglobeandmail.com |
|
Details | Domain | 1 | ctrlbox.com |
|
Details | Domain | 1 | www.ctrlbox.com |
|
Details | Domain | 170 | www.sans.org |
|
Details | Domain | 2 | www.counciloncybersecurity.org |
|
Details | Domain | 1 | ccsfiles.blob.core.windows.net |
|
Details | Domain | 2 | www-935.ibm.com |
|
Details | Domain | 1 | www.weil.com |
|
Details | Domain | 3 | www.ncsl.org |
|
Details | Domain | 3 | www.foxbusiness.com |
|
Details | Domain | 1 | www.insideprivacy.com |
|
Details | Domain | 11 | www.ibtimes.co.uk |
|
Details | Domain | 19 | money.cnn.com |
|
Details | Domain | 7 | www.independent.co.uk |
|
Details | Domain | 14 | www.cbc.ca |
|
Details | Domain | 1 | www.news1130.com |
|
Details | File | 1 | downloadfile.aspx |
|
Details | File | 1 | 5ciso-iec_27040-2015.pdf |
|
Details | File | 1 | rp_data-breach-investigation-report-2015_en_xg.pdf |
|
Details | File | 1 | id-theft-vol-eng.htm |
|
Details | File | 4 | wp-the-brazilian-underground-market.pdf |
|
Details | File | 3 | wp-pos-ram-scraper-malware.pdf |
|
Details | File | 8 | story.html |
|
Details | File | 1 | detour-gold-breach.pdf |
|
Details | File | 1 | fall-2014-poster.pdf |
|
Details | File | 1 | ccsfiles.blob |
|
Details | File | 1 | 2014.pdf |
|
Details | File | 1 | breach_study.pdf |
|
Details | File | 1 | en_digital_2015_v2.pdf |
|
Details | File | 1 | breach-notification-laws.aspx |
|
Details | File | 1 | updated-data-breach-notification.pdf |
|
Details | File | 1 | d580f1c5d44e_story.html |
|
Details | File | 1 | madison-hack-out-of-all-the-data-breaches-that-have-happened-this-is-probably-the-funniest-10407666.html |
|
Details | md5 | 1 | bb820ab03db7430abac40451ba4d3bb7 |
|
Details | Url | 2 | https://www.privacyrights.org/content/about-privacy-rights-clearinghouse. |
|
Details | Url | 1 | http://www.healthcareinfosecurity.com/health-data-breaches-go- |
|
Details | Url | 1 | http://www.scmagazine.com/more-than-half-of-corporate- |
|
Details | Url | 1 | http://www.darkreading.com/attacks-and-breaches/most-security-breaches-go-unreported/d/d- |
|
Details | Url | 2 | http://khc.sourceforge.net/en/. |
|
Details | Url | 5 | http://research.microsoft.com |
|
Details | Url | 2 | https://www.exploreanalytics.com/. |
|
Details | Url | 1 | http://krebsonsecurity.com/2013/10/nordstrom-finds-cash-register-skimmers/. |
|
Details | Url | 1 | http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm |
|
Details | Url | 1 | http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg. |
|
Details | Url | 1 | http://www.forbes.com/sites/thomasbrewster/2015/07/06 |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/insider- |
|
Details | Url | 33 | http://blog.trendmicro.com/trendlabs-security- |
|
Details | Url | 23 | http://blog.trendmicro.com/trendlabs- |
|
Details | Url | 1 | http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/hawkeye- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/attack- |
|
Details | Url | 1 | http://www.bbc.com/news/magazine-32900600. |
|
Details | Url | 1 | http://www.trendmicro.ca/cloud- |
|
Details | Url | 1 | http://www.irishtimes.com/news/crime-and-law/ryanair-falls-victim-to-4- |
|
Details | Url | 14 | http://www.trendmicro.com/cloud-content/us/pdfs/security- |
|
Details | Url | 1 | http://www.credit.com/credit-scores/what-does-fico-stand-for-and-what-is-a-fico- |
|
Details | Url | 1 | http://www.eweek.com/c/a/security/northrop-grumman-l3- |
|
Details | Url | 1 | http://www.washingtonpost.com/local |
|
Details | Url | 1 | http://www.theglobeandmail.com/report-on-business/industry-news/energy- |
|
Details | Url | 1 | https://www.ctrlbox.com/docs/reports/detour-gold-breach.pdf |
|
Details | Url | 10 | https://www.sans.org |
|
Details | Url | 1 | https://www.sans.org/critical-security-controls/history. |
|
Details | Url | 1 | http://www.counciloncybersecurity.org/critical-controls/. |
|
Details | Url | 1 | http://www.sans.org/media/critical-security-controls/fall-2014-poster.pdf |
|
Details | Url | 1 | https://ccsfiles.blob.core.windows.net/web-site/file/bb820ab03db7430abac40451ba4d3bb7 |
|
Details | Url | 1 | http://www-935.ibm.com/services/multimedia/sel03027usen_poneman_2014_cost_of_data_ |
|
Details | Url | 1 | http://www.ncsl.org/research/telecommunications-and-information-technology/security- |
|
Details | Url | 1 | http://www.foxbusiness.com/technology/2015/06/22/what-are-data-breach- |
|
Details | Url | 1 | https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/updated-data-breach-notification.pdf |
|
Details | Url | 1 | http://www.cadwalader |
|
Details | Url | 1 | http://www.insideprivacy.com/united-states/congress |
|
Details | Url | 2 | http://www.ibtimes.co.uk |
|
Details | Url | 1 | http://www.forbes.com/sites/katevinton/2015/07/09/21-5-million-americans-were- |
|
Details | Url | 1 | http://www.washingtonpost.com/realestate/irs-was- |
|
Details | Url | 1 | http://money.cnn.com/2015/07/17/technology/ucla-health-hack/. |
|
Details | Url | 1 | http://www.independent.co.uk/voices/comment/ashley- |
|
Details | Url | 1 | http://www.cbc.ca/news/technology/costco-joins- |
|
Details | Url | 1 | http://www.news1130.com/2015/07/14/possible-data-breach-on-walmart-photo-site/. |