1 results sorted by ID
Possible spell-corrected query: mpsu-can
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Jelle Vos, Zekeriya Erkin, Christian Doerr
Cryptographic protocols
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an effective angle for mitigation, as defenders can recognize domain names, attachments, tools, or systems used in a previous compromisation attempt,...
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Jelle Vos, Zekeriya Erkin, Christian Doerr
Cryptographic protocols
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an effective angle for mitigation, as defenders can recognize domain names, attachments, tools, or systems used in a previous compromisation attempt,...