The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code: DatasetGenerationError Exception: TypeError Message: Couldn't cast array of type int64 to null Traceback: Traceback (most recent call last): File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1870, in _prepare_split_single writer.write_table(table) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 622, in write_table pa_table = table_cast(pa_table, self._schema) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2292, in table_cast return cast_table_to_schema(table, schema) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2245, in cast_table_to_schema arrays = [ File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2246, in <listcomp> cast_array_to_feature( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in wrapper return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks]) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in <listcomp> return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks]) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2013, in cast_array_to_feature casted_array_values = _c(array.values, feature[0]) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1797, in wrapper return func(array, *args, **kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2005, in cast_array_to_feature arrays = [ File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2006, in <listcomp> _c(array.field(name) if name in array_fields else null_array, subfeature) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1797, in wrapper return func(array, *args, **kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2065, in cast_array_to_feature casted_array_values = _c(array.values, feature.feature) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1797, in wrapper return func(array, *args, **kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2102, in cast_array_to_feature return array_cast( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1797, in wrapper return func(array, *args, **kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1948, in array_cast raise TypeError(f"Couldn't cast array of type {_short_str(array.type)} to {_short_str(pa_type)}") TypeError: Couldn't cast array of type int64 to null The above exception was the direct cause of the following exception: Traceback (most recent call last): File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1417, in compute_config_parquet_and_info_response parquet_operations = convert_to_parquet(builder) File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1049, in convert_to_parquet builder.download_and_prepare( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 924, in download_and_prepare self._download_and_prepare( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1000, in _download_and_prepare self._prepare_split(split_generator, **prepare_split_kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1741, in _prepare_split for job_id, done, content in self._prepare_split_single( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1897, in _prepare_split_single raise DatasetGenerationError("An error occurred while generating the dataset") from e datasets.exceptions.DatasetGenerationError: An error occurred while generating the dataset
Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
text
string | event
list | task
string |
---|---|---|
An email scam passing as a Netflix notification has been targeting subscribers of the streaming service . | [
{
"event_trigger": "email scam",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "a Netflix notification",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "the streaming service",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "subscribers",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
The goal of the scam is to steal personal and credit card information , according to a report from Mailguard . | [
{
"event_trigger": "the scam",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "steal personal and credit card information",
"role": "purpose",
"argument_pos": []
}
]
}
] | EE |
The faux website has the Netflix logo on display plus The Crown and House of Cards banners to further trick visitors . | [
{
"event_trigger": "further trick",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "visitors",
"role": "victim",
"argument_pos": []
},
{
"argument": "The Crown and House of Cards banners",
"role": "tool",
"argument_pos": []
},
{
"argument": "the Netflix logo",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "The faux website",
"role": "tool",
"argument_pos": []
}
]
}
] | EE |
Unfortunately , these scams are common on the internet and target popular brands such as Netflix and other companies with large customer bases to lure users into giving out personal information . β | [
{
"event_trigger": "lure",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "other companies",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "Netflix",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "users",
"role": "victim",
"argument_pos": []
},
{
"argument": "giving out personal information",
"role": "purpose",
"argument_pos": []
}
]
}
] | EE |
The scam uses a basic social engineering technique that lures the potential target into clicking on the provided URL . | [
{
"event_trigger": "lures",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "the potential target",
"role": "victim",
"argument_pos": []
},
{
"argument": "clicking on the provided URL",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "The scam uses a basic social engineering technique",
"role": "attack pattern",
"argument_pos": []
}
]
}
] | EE |
In addition , the victim feels safe since the link comes from one of his Facebook friends . | [
{
"event_trigger": "comes from",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "his Facebook friends",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "the link",
"role": "tool",
"argument_pos": []
},
{
"argument": "the victim",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Typical strategy : Install something to watch the video Cybersecurity experts are already familiar with the technique used to trick questioning users into installing the Facebook Message Video virus . | [
{
"event_trigger": "trick",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "users",
"role": "victim",
"argument_pos": []
},
{
"argument": "installing the Facebook Message Video virus",
"role": "purpose",
"argument_pos": []
}
]
}
] | EE |
As soon as the victim clicks the compromised link and enters the phishing website ( which apparently is designed to look like YouTube or another popular video sharing platform ) , a misleading pop - up appears , asking the victim to install an update or an application ( it could be a fake Adobe Flash Player or a plug - in ) . | [
{
"event_trigger": "designed to look like",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "victim",
"role": "victim",
"argument_pos": []
},
{
"argument": "clicks the compromised link",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "enters the phishing website",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "YouTube",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "video sharing platform",
"role": "trusted entity",
"argument_pos": []
}
]
}
] | EE |
The file suggested to the user contains no software related to video streaming and simply carries the malicious payload that later compromises victim βs account and sends out the deceptive messages to all victim βs contacts . | [
{
"event_trigger": "sends out",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "the deceptive messages",
"role": "tool",
"argument_pos": []
},
{
"argument": "victim",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
One of the latest cyber attacks was based on fake pop - ups appearing on compromised sites , urging people to install an updated Flash Player . | [
{
"event_trigger": "attacks",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "fake pop - ups appearing on compromised sites",
"role": "attack pattern",
"argument_pos": []
}
]
}
] | EE |
Matthew Maglieri faced more than a challenge when he agreed to become the chief information security officer for Ruby Life Inc. , parent of the Toronto - based Ashley Madison and other dating sites which in 2015 saw hackers release records of some 36 million members , plus application code and corporate email . | [
{
"event_trigger": "release",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "hackers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "2015",
"role": "time",
"argument_pos": []
},
{
"argument": "records",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "36 million",
"role": "number of victim",
"argument_pos": []
},
{
"argument": "members",
"role": "victim",
"argument_pos": []
},
{
"argument": "application code",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "corporate email",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "dating sites",
"role": "victim",
"argument_pos": []
},
{
"argument": "Madison",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Over 200 victims in Europe and beyond continue to suffer from a brand new ransomware attack demanding Bitcoin to release encrypted files . | [
{
"event_trigger": "ransomware attack demanding Bitcoin",
"event_type": "ransom",
"trigger_pos": [],
"arguments": [
{
"argument": "victims",
"role": "victim",
"argument_pos": []
},
{
"argument": "Europe",
"role": "place",
"argument_pos": []
},
{
"argument": "encrypted files",
"role": "attack pattern",
"argument_pos": []
}
]
}
] | EE |
Known as Bad Rabbit , the ransomware of unknown origin demands 0.05 BTC ( $ 290 ) to unlock infected computers . | [
{
"event_trigger": "demands",
"event_type": "ransom",
"trigger_pos": [],
"arguments": [
{
"argument": "0.05 BTC",
"role": "price",
"argument_pos": []
},
{
"argument": "$ 290",
"role": "price",
"argument_pos": []
},
{
"argument": "the ransomware",
"role": "tool",
"argument_pos": []
},
{
"argument": "Bad Rabbit",
"role": "tool",
"argument_pos": []
},
{
"argument": "computers",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
β No exploits were used , so the victim would have to manually execute the malware dropper , which pretends to be an Adobe Flash installer . | [
{
"event_trigger": "pretends to be",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "an Adobe Flash installer",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "the malware dropper",
"role": "tool",
"argument_pos": []
},
{
"argument": "the victim",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Bad Rabbit is just the latest cyberattack to hit the Russian and Ukrainian zone , with WannaCry and NotPetya all having left their mark over the past six months . | [
{
"event_trigger": "the latest cyberattack",
"event_type": "ransom",
"trigger_pos": [],
"arguments": [
{
"argument": "Bad Rabbit",
"role": "tool",
"argument_pos": []
}
]
}
] | EE |
The ransom demands from Bad Rabbit βs hackers are similar to those of WannaCry at around $ 300 per machine . | [
{
"event_trigger": "The ransom demands",
"event_type": "ransom",
"trigger_pos": [],
"arguments": [
{
"argument": "hackers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "WannaCry",
"role": "tool",
"argument_pos": []
},
{
"argument": "$ 300",
"role": "price",
"argument_pos": []
},
{
"argument": "machine",
"role": "victim",
"argument_pos": []
},
{
"argument": "Bad Rabbit",
"role": "tool",
"argument_pos": []
}
]
}
] | EE |
Unlike NotPetya , however , there appears to be no attempt to wipe data from victims , whether or not they send the requisite Bitcoins . | [
{
"event_trigger": "send the requisite Bitcoins",
"event_type": "ransom",
"trigger_pos": [],
"arguments": [
{
"argument": "they",
"role": "attacker",
"argument_pos": []
},
{
"argument": "victims",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Kaspersky adds it is not yet known whether or not paying the ransomware amount results in full control being returned . | [
{
"event_trigger": "paying the ransomware amount",
"event_type": "ransom",
"trigger_pos": [],
"arguments": []
}
] | EE |
Vendors are reacting swiftly to a vulnerability that lets attackers eavesdrop on your network traffic . | [
{
"event_trigger": "are reacting",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "Vendors",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "a vulnerability",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "lets attackers eavesdrop on your network traffic",
"role": "capabilities",
"argument_pos": []
}
]
}
] | EE |
Monday morning was not a great time to be an IT admin , with the public release of a bug that effectively broke WPA2 wireless security . | [
{
"event_trigger": "the public release",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "a bug",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "broke WPA2 wireless security",
"role": "capabilities",
"argument_pos": []
}
]
}
] | EE |
As reported previously by ZDNet , the bug , dubbed " KRACK " -- which stands for Key Reinstallation Attack -- is at heart a fundamental flaw in the way Wi - Fi Protected Access II ( WPA2 ) operates . | [
{
"event_trigger": "reported",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "ZDNet",
"role": "discoverer",
"argument_pos": []
},
{
"argument": "bug",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "KRACK",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "Key Reinstallation Attack",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "flaw",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "Wi - Fi Protected Access II ( WPA2 )",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
According to security researcher and academic Mathy Vanhoef , who discovered the flaw , threat actors can leverage the vulnerability to decrypt traffic , hijack connections , perform man - in - the - middle attacks , and eavesdrop on communication sent from a WPA2 - enabled device . | [
{
"event_trigger": "discovered",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "security researcher",
"role": "discoverer",
"argument_pos": []
},
{
"argument": "the flaw",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "decrypt traffic",
"role": "capabilities",
"argument_pos": []
},
{
"argument": "hijack connections",
"role": "capabilities",
"argument_pos": []
},
{
"argument": "perform man - in - the - middle attacks",
"role": "capabilities",
"argument_pos": []
},
{
"argument": "eavesdrop on communication",
"role": "capabilities",
"argument_pos": []
},
{
"argument": "a WPA2 - enabled device",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "academic Mathy Vanhoef",
"role": "discoverer",
"argument_pos": []
}
]
}
] | EE |
US - CERT has known of the bug for some months and informed vendors ahead of the public disclosure to give them time to prepare patches and prevent the vulnerability from being exploited in the wild -- of which there are no current reports of this bug being harnessed by cyberattackers . | [
{
"event_trigger": "informed",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "vendors",
"role": "vulnerable system owner",
"argument_pos": []
}
]
}
] | EE |
The bug is present in WPA2 's cryptographic nonce and can be utilized to dupe a connected party into reinstalling a key which is already in use . | [
{
"event_trigger": "is present in",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "WPA2",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "The bug",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "dupe a connected party into reinstalling a key",
"role": "capabilities",
"argument_pos": []
},
{
"argument": "cryptographic nonce",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
In general , Windows and newer versions of iOS are unaffected , but the bug can have a serious impact on Android 6.0 Marshmallow and newer . | [
{
"event_trigger": "unaffected",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "iOS",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "newer versions",
"role": "vulnerable system version",
"argument_pos": []
},
{
"argument": "Windows",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
The vulnerability does not mean the world of WPA2 has come crumbling down , but it is up to vendors to mitigate the issues this may cause . | [
{
"event_trigger": "mitigate",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the issues",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "vendors",
"role": "releaser",
"argument_pos": []
},
{
"argument": "WPA2",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "vulnerability",
"role": "vulnerability",
"argument_pos": []
}
]
}
] | EE |
In total , ten CVE numbers have been preserved to describe the vulnerability and its impact , and according to the US Department of Homeland Security ( DHS ) , the main affected vendors are Aruba , Cisco , Espressif Systems , Fortinet , the FreeBSD Project , HostAP , Intel , Juniper Networks , Microchip Technology , Red Hat , Samsung , various units of Toshiba and Ubiquiti Networks . | [
{
"event_trigger": "impact",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the vulnerability",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "Ubiquiti Networks",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Toshiba",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Samsung",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Red Hat",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Microchip Technology",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "vendors",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Juniper Networks",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Aruba",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Intel",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Cisco",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "HostAP",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Espressif Systems",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Fortinet",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "the FreeBSD Project",
"role": "vulnerable system owner",
"argument_pos": []
}
]
}
] | EE |
Technology companies are starting to respond to a new Wi - Fi exploit affecting all modern Wi - Fi networks using WPA or WPA2 encryption . | [
{
"event_trigger": "affecting",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "Technology companies",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "Wi - Fi networks",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "WPA",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "WPA2",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "a new Wi - Fi exploit",
"role": "vulnerability",
"argument_pos": []
}
]
}
] | EE |
Security researchers claim devices running macOS , Windows , iOS , Android , and Linux will be affected by the vulnerabilities . | [
{
"event_trigger": "claim",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "Security researchers",
"role": "discoverer",
"argument_pos": []
},
{
"argument": "devices",
"role": "supported platform",
"argument_pos": []
},
{
"argument": "macOS",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Windows",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "iOS",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Android",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Linux",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
Microsoft says it has already fixed the problem for customers running supported versions of Windows . | [
{
"event_trigger": "fixed",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the problem",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "Windows",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Microsoft",
"role": "releaser",
"argument_pos": []
},
{
"argument": "supported versions",
"role": "vulnerable system version",
"argument_pos": []
}
]
}
] | EE |
β We have released a security update to address this issue , β says a Microsoft spokesperson in a statement to The Verge . | [
{
"event_trigger": "address",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "this issue",
"role": "vulnerability",
"argument_pos": []
}
]
}
] | EE |
β Customers who apply the update , or have automatic updates enabled , will be protected . | [
{
"event_trigger": "apply",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the update",
"role": "patch",
"argument_pos": []
},
{
"argument": "automatic updates",
"role": "patch",
"argument_pos": []
}
]
}
] | EE |
Microsoft says the Windows updates released on October 10th protect customers , and the company β withheld disclosure until other vendors could develop and release updates . β | [
{
"event_trigger": "released",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "Microsoft",
"role": "releaser",
"argument_pos": []
},
{
"argument": "the Windows updates",
"role": "patch",
"argument_pos": []
},
{
"argument": "October 10th",
"role": "time",
"argument_pos": []
}
]
}
] | EE |
While it looks like Android and Linux devices are affected by the worst part of the vulnerabilities , allowing attackers to manipulate websites , Google has promised a fix for affected devices β in the coming weeks . β | [
{
"event_trigger": "are affected",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the vulnerabilities",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "Android and Linux devices",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "allowing attackers to manipulate websites",
"role": "capabilities",
"argument_pos": []
}
]
}
] | EE |
Google βs own Pixel devices will be the first to receive fixes with security patch level of November 6 , 2017 , but most other handsets are still well behind even the latest updates . | [
{
"event_trigger": "receive",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "Pixel devices",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "November 6 , 2017",
"role": "time",
"argument_pos": []
},
{
"argument": "Google",
"role": "releaser",
"argument_pos": []
},
{
"argument": "fixes",
"role": "patch",
"argument_pos": []
}
]
}
] | EE |
Security researchers claim 41 percent of Android devices are vulnerable to an β exceptionally devastating β variant of the Wi - Fi attack that involves manipulating traffic , and it will take time to patch older devices . | [
{
"event_trigger": "claim",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "Security researchers",
"role": "discoverer",
"argument_pos": []
}
]
}
] | EE |
The Verge has reached out to a variety of Android phone makers to clarify when security patches will reach handsets , and we βll update you accordingly . | [
{
"event_trigger": "will reach",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "Android phone makers",
"role": "releaser",
"argument_pos": []
},
{
"argument": "security patches",
"role": "patch",
"argument_pos": []
},
{
"argument": "handsets",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
At the time of writing , Apple has not yet clarified whether the latest versions of macOS and iOS are vulnerable . | [
{
"event_trigger": "are vulnerable",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "iOS",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "macOS",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "the latest versions",
"role": "vulnerable system version",
"argument_pos": []
}
]
}
] | EE |
The Wi - Fi Alliance , a network of companies responsible for Wi - Fi , has responded to the disclosure of the vulnerabilities . | [
{
"event_trigger": "the disclosure",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the vulnerabilities",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "The Wi - Fi Alliance",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "companies",
"role": "vulnerable system owner",
"argument_pos": []
},
{
"argument": "network",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
β This issue can be resolved through straightforward software updates , and the Wi - Fi industry , including major platform providers , has already started deploying patches to Wi - Fi users , β says a Wi - Fi Alliance spokesperson . | [
{
"event_trigger": "deploying",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the Wi - Fi industry",
"role": "releaser",
"argument_pos": []
},
{
"argument": "major platform providers",
"role": "releaser",
"argument_pos": []
},
{
"argument": "patches",
"role": "patch",
"argument_pos": []
}
]
}
] | EE |
β Users can expect all their Wi - Fi devices , whether patched or unpatched , to continue working well together . β | [
{
"event_trigger": "patched or unpatched",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "all their Wi - Fi devices",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
Apple also confirmed to both The Verge and AppleInsider that the vulnerability is patched in a beta version of the current operating systems . | [
{
"event_trigger": "is patched",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "operating systems",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "the vulnerability",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "a beta version",
"role": "vulnerable system version",
"argument_pos": []
},
{
"argument": "Apple",
"role": "releaser",
"argument_pos": []
}
]
}
] | EE |
The fix should go public in a few weeks , so iOS and macOS devices are n't in the clear just yet . | [
{
"event_trigger": "go public",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "The fix",
"role": "patch",
"argument_pos": []
},
{
"argument": "a few weeks",
"role": "time",
"argument_pos": []
},
{
"argument": "iOS and macOS devices",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
The company says that a yet to be identified attacker ( or attackers ) has gained access to the infrastructure hosting its website β Forrester.com . | [
{
"event_trigger": "has gained access",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "attacker",
"role": "attacker",
"argument_pos": []
},
{
"argument": "the infrastructure hosting its website",
"role": "victim",
"argument_pos": []
},
{
"argument": "Forrester.com",
"role": "victim",
"argument_pos": []
},
{
"argument": "attackers",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
Attacker stole site credentials and stole proprietary research Steven Peltzman , Forrester 's Chief Business Technology Officer , says the attacker stole valid Forrester.com user credentials that gave him access to Forrester.com accounts . | [
{
"event_trigger": "stole",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "site credentials",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "Attacker",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
" The hacker used that access to steal research reports made available to our clients , " he said . | [
{
"event_trigger": "access to steal",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "The hacker",
"role": "attacker",
"argument_pos": []
},
{
"argument": "research reports",
"role": "compromised data",
"argument_pos": []
}
]
}
] | EE |
" There is no evidence that confidential client data , financial information , or confidential employee data was accessed or exposed as part of the incident , " Peltzman clarified . | [
{
"event_trigger": "was accessed or exposed",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "confidential employee data",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "financial information",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "confidential client data",
"role": "compromised data",
"argument_pos": []
}
]
}
] | EE |
Even if no sensitive customer data was stolen , the market research information to which hackers had access is very valuable in the hands of an economic espionage hacker group , allowing it to determine what technologies are Forrester 's customers working on , or what products they 're ready to launch . | [
{
"event_trigger": "was stolen",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "sensitive customer data",
"role": "compromised data",
"argument_pos": []
}
]
}
] | EE |
It turns out , the scammer hacked into a real user 's account and used it to find a closing sale , then pretended to be the buyer . | [
{
"event_trigger": "pretended to be",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "the buyer",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "hacked into a real user 's account",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "the scammer",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
Unfortunately , scam artists will gain access to eBay member accounts through phishing emails in order to defraud other members . | [
{
"event_trigger": "gain access",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "scam artists",
"role": "attacker",
"argument_pos": []
},
{
"argument": "member accounts",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "through phishing emails",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "defraud other members",
"role": "purpose",
"argument_pos": []
},
{
"argument": "eBay",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Criminals often exploit well - known , trusted brand names like eBay to attract consumers and then lure them into fraudulent transactions . | [
{
"event_trigger": "attract",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "consumers",
"role": "victim",
"argument_pos": []
},
{
"argument": "trusted brand",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "eBay",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "Criminals",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
The average cost of a data breach for U.S. companies is $ 7.4 million , or $ 225 per lost or stolen record , a June 2017 study by IBM and the Ponemon Institute , a Traverse City , Michigan , researcher , found . | [
{
"event_trigger": "a data breach",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "U.S. companies",
"role": "victim",
"argument_pos": []
},
{
"argument": "lost or stolen record",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "June 2017",
"role": "time",
"argument_pos": []
},
{
"argument": "$ 7.4 million",
"role": "damage amount",
"argument_pos": []
},
{
"argument": "$ 225",
"role": "damage amount",
"argument_pos": []
}
]
}
] | EE |
Costs related to data breaches can include the investigation , legal costs to defend against and settle class - action lawsuits , credit monitoring for affected customers , and coverage of fraud losses . | [
{
"event_trigger": "data breaches",
"event_type": "data breach",
"trigger_pos": [],
"arguments": []
}
] | EE |
One of the largest hacks ever was disclosed this month , when credit reporting company Equifax Inc. revealed that sensitive data from 143 million consumers , including Social Security numbers and birth dates , was exposed . | [
{
"event_trigger": "was exposed",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "birth dates",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "Social Security numbers",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "sensitive data",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "143 million",
"role": "number of victim",
"argument_pos": []
},
{
"argument": "consumers",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Investors seem to think the incident will have a much greater impact on At a seminar in Garden City this month , Henry Prince , chief security officer at Shellproof Security in Greenvale , explained how in a ransomware attack β one of many types β cybercriminals can buy specialized tools such as those used to send phishing emails . | [
{
"event_trigger": "send",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "phishing emails",
"role": "tool",
"argument_pos": []
},
{
"argument": "specialized tools",
"role": "tool",
"argument_pos": []
},
{
"argument": "cybercriminals",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
But if one gets through and an employee clicks on the link in the phishing email , the business β network is compromised . | [
{
"event_trigger": "gets through",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "the phishing email",
"role": "tool",
"argument_pos": []
},
{
"argument": "an employee",
"role": "victim",
"argument_pos": []
},
{
"argument": "clicks on the link",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "the business β network is compromised",
"role": "purpose",
"argument_pos": []
}
]
}
] | EE |
Hackers then can demand payment , typically in an untraceable cryptocurrency like Bitcoin β a digital asset that uses encryption β before agreeing to decrypt the files . | [
{
"event_trigger": "demand payment",
"event_type": "ransom",
"trigger_pos": [],
"arguments": [
{
"argument": "Hackers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "untraceable cryptocurrency like Bitcoin",
"role": "payment method",
"argument_pos": []
}
]
}
] | EE |
The emails are designed to mimic a real phishing campaign that seeks passwords and personal information . | [
{
"event_trigger": "phishing campaign",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "The emails",
"role": "tool",
"argument_pos": []
},
{
"argument": "seeks passwords and personal information",
"role": "purpose",
"argument_pos": []
}
]
}
] | EE |
In April , for instance , Northwell sent out phishing emails with a tax theme . | [
{
"event_trigger": "sent out",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "April",
"role": "time",
"argument_pos": []
},
{
"argument": "Northwell",
"role": "attacker",
"argument_pos": []
},
{
"argument": "phishing emails",
"role": "tool",
"argument_pos": []
},
{
"argument": "a tax theme",
"role": "trusted entity",
"argument_pos": []
}
]
}
] | EE |
Hughes collects reports on which employees take the bait by user , department and job function . | [
{
"event_trigger": "take the bait",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "employees",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Another tool : Non-Northwell emails have an β external β notation in the subject line , making it harder for outsiders to pretend to be a colleague . | [
{
"event_trigger": "pretend to be",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "a colleague",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "Non-Northwell emails",
"role": "tool",
"argument_pos": []
}
]
}
] | EE |
Data leaks at Long Island companies have caused executives to heighten security . | [
{
"event_trigger": "Data leaks",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "Long Island companies",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
In 2014 , Farmingdale - based supermarket chain Uncle Giuseppe βs Marketplace said that foreign hackers had breached the credit card database of three stores . | [
{
"event_trigger": "had breached",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "stores",
"role": "victim",
"argument_pos": []
},
{
"argument": "three",
"role": "number of victim",
"argument_pos": []
},
{
"argument": "the credit card database",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "foreign hackers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "2014",
"role": "time",
"argument_pos": []
},
{
"argument": "Uncle Giuseppe",
"role": "victim",
"argument_pos": []
},
{
"argument": "Farmingdale - based supermarket",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Joseph Neglia , director of information technology at Uncle Giuseppe βs , said that after the data breach , which affected about 100 customers , the company began scheduling β monthly vulnerability scans β and upgraded its monitoring and security systems . | [
{
"event_trigger": "the data breach",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "100",
"role": "number of victim",
"argument_pos": []
},
{
"argument": "customers",
"role": "victim",
"argument_pos": []
},
{
"argument": "Uncle Giuseppe",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
SAN FRANCISCO β Hackers took advantage of an Equifax security vulnerability two months after an industry group discovered the coding flaw and shared a fix for it , raising questions about why Equifax did n't update its software successfully when the danger became known . | [
{
"event_trigger": "update",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "its software",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Equifax",
"role": "releaser",
"argument_pos": []
}
]
}
] | EE |
A week after Equifax revealed one of the largest breaches of consumers ' private financial data in history β 143 million consumers and access to the credit - card data of 209,000 β the industry group that manages the open source software in which the hack occurred blamed Equifax . | [
{
"event_trigger": "breaches",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "private financial data",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "143 million",
"role": "number of victim",
"argument_pos": []
},
{
"argument": "consumers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "consumers",
"role": "victim",
"argument_pos": []
},
{
"argument": "Equifax",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
" The Equifax data compromise was due to ( Equifax 's ) failure to install the security updates provided in a timely manner , " The Apache Foundation , which oversees the widely - used open source software , said in a statement Thursday . | [
{
"event_trigger": "data compromise",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "Equifax",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Equifax told USA TODAY late Wednesday the criminals who gained access to its customer data exploited a website application vulnerability known as Apache Struts CVE -2017-5638 . | [
{
"event_trigger": "exploited",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "website application vulnerability",
"role": "vulnerability",
"argument_pos": []
}
]
}
] | EE |
The vulnerability was patched on March 7 , the same day it was announced , The Apache Foundation said . | [
{
"event_trigger": "announced",
"event_type": "discover vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "March 7",
"role": "time",
"argument_pos": []
}
]
}
] | EE |
Equifax did not respond to a question Wednesday about whether the patches were applied , and if not , why not . | [
{
"event_trigger": "were applied",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the patches",
"role": "patch",
"argument_pos": []
},
{
"argument": "Equifax",
"role": "releaser",
"argument_pos": []
}
]
}
] | EE |
" They should have patched it as soon as possible , not to exceed a week . | [
{
"event_trigger": "have patched",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "They",
"role": "releaser",
"argument_pos": []
},
{
"argument": "as soon as possible",
"role": "time",
"argument_pos": []
},
{
"argument": "not to exceed a week",
"role": "time",
"argument_pos": []
}
]
}
] | EE |
A typical bank would have patched this critical vulnerability within a few days , β said Pravin Kothari , CEO of CipherCloud , a cloud security company . | [
{
"event_trigger": "have patched",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "A typical bank",
"role": "releaser",
"argument_pos": []
},
{
"argument": "this critical vulnerability",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "a few days",
"role": "time",
"argument_pos": []
}
]
}
] | EE |
The national ID numbers for at least 14,000 Argentinians have been exposed , but the leak could potentially affect tens of thousands more people . | [
{
"event_trigger": "have been exposed",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "14,000",
"role": "number of victim",
"argument_pos": []
},
{
"argument": "Argentinians",
"role": "victim",
"argument_pos": []
},
{
"argument": "The national ID numbers",
"role": "compromised data",
"argument_pos": []
}
]
}
] | EE |
The findings will put further pressure on Equifax , which has been criticized for its haphazard and slow response to a breach that exposed the personal details of 143 million U.S. consumers , as well as an as - yet - unspecified number of British and Canadian residents . | [
{
"event_trigger": "a breach",
"event_type": "data breach",
"trigger_pos": [],
"arguments": []
}
] | EE |
Scammers have been using Hurricane Harvey - themed messages to trick people into opening phishing emails and links on social media sites , which can steal login information , infect machines with malware , or con victims out of money . | [
{
"event_trigger": "trick",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "opening phishing emails and links",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "Hurricane Harvey - themed messages",
"role": "tool",
"argument_pos": []
},
{
"argument": "Scammers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "steal login information",
"role": "purpose",
"argument_pos": []
},
{
"argument": "infect machines with malware",
"role": "purpose",
"argument_pos": []
},
{
"argument": "con victims out of money",
"role": "purpose",
"argument_pos": []
},
{
"argument": "people",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
As the advisory notes , a common scam during and after natural disasters is for fraudsters to pretend to set up relief funds and request donations . | [
{
"event_trigger": "pretend",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "set up relief funds and request donations",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "fraudsters",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
β People all over the world quickly rushed to their social media accounts to find the best avenues to donate to victims , but these same avenues are ideal for scammers who try to convince victims to donate to their fraudulent Hurricane Harvey cause . β | [
{
"event_trigger": "convince",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "donate",
"role": "purpose",
"argument_pos": []
},
{
"argument": "scammers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "victims",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
It βs common for fraudsters to take advantage of news du jour to bait prospective victims . | [
{
"event_trigger": "bait",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "prospective victims",
"role": "victim",
"argument_pos": []
},
{
"argument": "fraudsters",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
β Consistently , attackers use world events as themes for their attacks , β said Oren Falkowitz , CEO at Area1 Security , a cybersecurity startup that fights phishing . | [
{
"event_trigger": "phishing",
"event_type": "phishing",
"trigger_pos": [],
"arguments": []
}
] | EE |
Universities have been vulnerable to attacks in the past , with cybercriminals stealing student and faculty databases and hackers vandalizing university websites . | [
{
"event_trigger": "attacks",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "Universities",
"role": "victim",
"argument_pos": []
},
{
"argument": "the past",
"role": "time",
"argument_pos": []
}
]
}
] | EE |
Phishing happens when hackers steal your passwords by sending you links to fake websites that look like the real deal . | [
{
"event_trigger": "look like",
"event_type": "phishing",
"trigger_pos": [],
"arguments": []
}
] | EE |
The latest warning , sent Monday , called out malware hidden in a document pretending to be from Syracuse University 's chancellor . | [
{
"event_trigger": "pretending to be",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "Syracuse University",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "malware hidden in a document",
"role": "attack pattern",
"argument_pos": []
},
{
"argument": "chancellor",
"role": "trusted entity",
"argument_pos": []
}
]
}
] | EE |
Digging through my old emails , I found about 20 phishing warnings that had gone out during the four years I 'd been there . | [
{
"event_trigger": "phishing",
"event_type": "phishing",
"trigger_pos": [],
"arguments": []
}
] | EE |
Syracuse declined to comment on phishing attacks against the school , but in a 2016 blog post , it said the attacks were " getting more frequent , cunning and malicious . " | [
{
"event_trigger": "phishing attacks",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "the school",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Duo Security , which protects more than 400 campuses , found that 70 percent of universities in the UK have fallen victim to phishing attacks . | [
{
"event_trigger": "phishing attacks",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "the UK",
"role": "place",
"argument_pos": []
},
{
"argument": "universities",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Syracuse , which uses Duo Security , fights phishing attacks with two - factor authentication , which requires a second form of identity verification , like a code sent to your phone . | [
{
"event_trigger": "phishing attacks",
"event_type": "phishing",
"trigger_pos": [],
"arguments": []
}
] | EE |
Kendra Cooley , a security analyst at Duo Security , pointed out that students are more likely to fall for phishing attacks because they have n't been exposed to them as frequently as working adults have . | [
{
"event_trigger": "phishing attacks",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "students",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
The school also runs monthly phishing campaigns : If a student or faculty member falls for the friendly trap , they 're redirected to a training opportunity . | [
{
"event_trigger": "phishing campaigns",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "The school",
"role": "attacker",
"argument_pos": []
}
]
}
] | EE |
When your network is being hit with at least two phishing attempts a day , Blair said , it 's a crucial precaution to keep students on guard . | [
{
"event_trigger": "phishing attempts",
"event_type": "phishing",
"trigger_pos": [],
"arguments": []
}
] | EE |
There was an influx of fake ransomware protection apps when WannaCry hit , as well as a spike in phony Pokemon Go apps stuffed with malware during the height of the game 's popularity . | [
{
"event_trigger": "WannaCry hit",
"event_type": "ransom",
"trigger_pos": [],
"arguments": []
}
] | EE |
If there 's a massive event going on , you can bet people are flooding the market with phony apps to trick victims into downloading viruses . | [
{
"event_trigger": "trick",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "victims",
"role": "victim",
"argument_pos": []
},
{
"argument": "people",
"role": "victim",
"argument_pos": []
},
{
"argument": "downloading viruses",
"role": "purpose",
"argument_pos": []
},
{
"argument": "flooding the market with phony apps",
"role": "attack pattern",
"argument_pos": []
}
]
}
] | EE |
Attackers have been phishing developers as a way of compromising Chrome extensions into spreading affiliate program ads that scare victims into paying for PC repairs . | [
{
"event_trigger": "have been phishing",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "Attackers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "developers",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Proofpoint researcher Kafeine has identified six compromised Chrome extensions that have been recently modified by an attacker after phishing a developer 's Google Account credentials . | [
{
"event_trigger": "phishing",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "attacker",
"role": "victim",
"argument_pos": []
},
{
"argument": "developer",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
Developers of several of the extensions have removed the threat in recent updates to their affected apps , including Web Developer , Copyfish , Chrometana , and Social Fixer . | [
{
"event_trigger": "have removed",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "the threat",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "Developers",
"role": "releaser",
"argument_pos": []
},
{
"argument": "recent updates",
"role": "patch",
"argument_pos": []
},
{
"argument": "apps",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Web Developer",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Copyfish",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Chrometana",
"role": "vulnerable system",
"argument_pos": []
},
{
"argument": "Social Fixer",
"role": "vulnerable system",
"argument_pos": []
}
]
}
] | EE |
The attackers have also been gathering credentials of users of Cloudflare , an availability service for website operators , which probably could be used in future attacks . | [
{
"event_trigger": "have also been gathering",
"event_type": "data breach",
"trigger_pos": [],
"arguments": [
{
"argument": "The attackers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "credentials",
"role": "compromised data",
"argument_pos": []
},
{
"argument": "Cloudflare",
"role": "victim",
"argument_pos": []
},
{
"argument": "users",
"role": "victim",
"argument_pos": []
}
]
}
] | EE |
" In many cases , victims were presented with fake JavaScript alerts prompting them to repair their PC , then redirecting them to affiliate programs from which the threat actors could profit , " notes Kafeine . | [
{
"event_trigger": "were presented",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "victims",
"role": "victim",
"argument_pos": []
},
{
"argument": "fake JavaScript",
"role": "tool",
"argument_pos": []
},
{
"argument": "redirecting them to affiliate programs",
"role": "attack pattern",
"argument_pos": []
}
]
}
] | EE |
The phishing emails that compromised developers ' Google Accounts purported to come from Google 's Chrome Web Store team , which claimed the developer 's extension did n't comply with its policies and would be removed unless the issue was fixed . | [
{
"event_trigger": "purported to come from",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "Chrome Web Store team",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "The phishing emails",
"role": "tool",
"argument_pos": []
},
{
"argument": "Google",
"role": "trusted entity",
"argument_pos": []
}
]
}
] | EE |
As Bleeping Computer recently reported , Google 's security team has sent an email warning to Chrome extension developers to be on the lookout for phishing attacks . | [
{
"event_trigger": "phishing attacks",
"event_type": "phishing",
"trigger_pos": [],
"arguments": []
}
] | EE |
The attackers had created a convincing copy of Google 's real account login page . | [
{
"event_trigger": "had created",
"event_type": "phishing",
"trigger_pos": [],
"arguments": [
{
"argument": "a convincing copy",
"role": "tool",
"argument_pos": []
},
{
"argument": "The attackers",
"role": "attacker",
"argument_pos": []
},
{
"argument": "real account login page",
"role": "trusted entity",
"argument_pos": []
},
{
"argument": "Google",
"role": "trusted entity",
"argument_pos": []
}
]
}
] | EE |
Adobe has resolved 11 security flaws in this month 's patch update on the heels of a far larger security round last month in which over a hundred bugs were squashed . | [
{
"event_trigger": "has resolved",
"event_type": "patch vulnerability",
"trigger_pos": [],
"arguments": [
{
"argument": "11 security flaws",
"role": "vulnerability",
"argument_pos": []
},
{
"argument": "patch update",
"role": "patch",
"argument_pos": []
},
{
"argument": "Adobe",
"role": "releaser",
"argument_pos": []
},
{
"argument": "last month",
"role": "time",
"argument_pos": []
}
]
}
] | EE |
End of preview.