Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence

P Koloveas, T Chantzios, S Alevizopoulou… - Electronics, 2021 - mdpi.com
In today's world, technology has become deep-rooted and more accessible than ever over a
plethora of different devices and platforms, ranging from company servers and commodity …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Mentions of security vulnerabilities on reddit, twitter and github

S Horawalavithana, A Bhattacharjee, R Liu… - IEEE/WIC/ACM …, 2019 - dl.acm.org
Activity on social media is seen as a relevant sensor for different aspects of the society. In a
heavily digitized society, security vulnerabilities pose a significant threat that is publicly …

Follow the blue bird: A study on threat data published on twitter

F Alves, A Andongabo, I Gashi, PM Ferreira… - … –ESORICS 2020: 25th …, 2020 - Springer
Abstract Open Source Intelligence (OSINT) has taken the interest of cybersecurity
practitioners due to its completeness and timeliness. In particular, Twitter has proven to be a …

[HTML][HTML] Exploring topic models to discern cyber threats on Twitter: A case study on Log4Shell

Y Wang, MA Bashar, M Chandramohan… - Intelligent Systems with …, 2023 - Elsevier
Gathering information about cyber threats from various sources can help organisations
improve proactive cyber defense and mitigate potential cyber attacks. Recently, Twitter has …

ExpSeeker: Extract public exploit code information from social media

Y Du, C Huang, G Liang, Z Fu, D Li, Y Ding - Applied Intelligence, 2023 - Springer
Malicious actors often utilize publicly available software vulnerabilities and exploit codes to
attack vulnerable targets. Exploit codes are shared across several platforms, including …

Monitoring social media for vulnerability-threat prediction and topic analysis

SY Huang, T Ban - 2020 IEEE 19th International Conference on …, 2020 - ieeexplore.ieee.org
Publicly available software vulnerabilities and exploit code are often abused by malicious
actors to launch cyberattacks to vulnerable targets. Organizations not only have to update …

An exploration analysis of social media security

S Verma, S Mishra - Predictive data security using AI: insights and issues …, 2022 - Springer
Social media security is a rising concern among today's generation, as when the pandemic
started, a lot more people than before have begun using social media due to lack of …

Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID‐19

A Bahl, A Sharma, MR Asghar - Security and Privacy, 2021 - Wiley Online Library
The COVID‐19 pandemic introduced the new norm that changed the way we work and live.
During these unprecedented times, most of the organizations expected their employees to …