Encyclopedia

data exfiltration

Also found in: Dictionary.

data exfiltration

Data exfiltration is the unauthorized extraction of data from a computer. The word exfiltration means to withdraw secretly from a hostile situation. See malware and data extrusion.
Copyright © 1981-2025 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
Mentioned in
References in periodicals archive
It is a proactive network that protects against data exfiltration and fast-evolving, elusive malware threats.
By providing visibility to every version of every file, we are making it quicker and easier to detect and respond to data exfiltration and insider threats.
- Threat corroboration: Identifies indicators of compromise and indicators of attack, exposing major threats including insider threats, account compromise, and data exfiltration.
Grand Theft Data: Data Exfiltration Study: Actors, Tactics, and Detection.
DLP is a powerful enterprise level tool capable of enhancing awareness of where sensitive information is located, improving the ability to manage that information and reduce the risk of unauthorized data exfiltration.
Able to filter both inbound and outbound traffic, Bandura enables organizations to better protect their networks from threats including network probes and scans, malware, command and control, botnets, ransomware, and other threats, mitigating the risk of breaches and sensitive data exfiltration.
Automated cyberattacks can now vector from machines, devices, insider threat actors, state sponsored groups, and private interest groups, often with real data exfiltration, ransom, downtime and pubic harassment consequences.
DNS is recognized as a prime target for data exfiltration. To ensure data confidentiality, respondents are prioritizing technology investment on the monitoring and analysis of DNS traffic (38%) over conventional security solutions such as firewalls (21%) and endpoint protection (35%).
ZeroFOX provides social media and digital security solutions to protect modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking and more.
The two modules are connected and able to support each other in information gathering, persistence and data exfiltration.
Jscrambler recently introduced a new webpage integrity module that enables the real-time detection and removal of code injections, MITB attacks, DOM-tampering and data exfiltration on the client-side, and we plan to continue focusing on research and development to ensure the innovation and resiliency of our product line."
Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.