data exfiltration


Also found in: Dictionary.

data exfiltration

Data exfiltration is the unauthorized extraction of data from a computer. The word exfiltration means to withdraw secretly from a hostile situation. See malware and data extrusion.
Mentioned in ?
References in periodicals archive ?
With the Appthority Platform and BoxTone, businesses are protected against known and unknown mobile malware, new malware used in targeted attacks, corporate data exfiltration, and intellectual property exposure.
Today, enSilo, a data exfiltration prevention vendor, launches into the international cybersecurity market with a real-time data exfiltration prevention platform to address the evolving nature of the cyber kill chain.
Real-time protection blocks data exfiltration attempts and gives IT time for a real-time response to contain threats at the endpoint - Stop outbound callback communications to disrupt compromised systems from being exploited from external command and control servers.
With the inclusion of File MPS, FireEye Malware Protection System now stops advanced targeted attacks across the Web and email threat vectors and malware resident on file shares, to build a 360-degree, stage-by-stage analysis of an advanced attack, from system exploitation to data exfiltration, to most effectively stop would-be APT attackers.
Consider the full kill chain and block outgoing command and control (C&C) connections : The kill chain consists of every step in the attack process, including post-breach steps like the communication channels malware uses to report back to attackers for data exfiltration.
18, 2014 /PRNewswire/ --In their ongoing efforts to steal sensitive data, hackers and malicious insiders are using encrypted channels to hide data exfiltration.
based companies protect their IT systems from unauthorized access, exploitation and data exfiltration.
This dual certification extends Bloombase support with HPE data-center and security products in offering an interoperable encryption solution to mitigate data exfiltration threats (adding to HPE Atalla Enterprise Secure Key Manager (ESKM), HPE on-premise 3PAR storage and StoreEver tape libraries, HPE ProLiant servers, and Integrity Certified for OpenVMS).
Mobile Application Security - behavioral analysis dynamically analyzes an application's real-time behavior - in a sandbox - to identify risky actions such as data exfiltration to suspicious locations.
Akamai's cloud strategy presently comprises security services planed to safeguard against phishing, malware and data exfiltration threats aimed at corporate networks.
Whether unwittingly, or perhaps at times deliberately, devices that are "allowed" on the network by firewalls and IPSs become the launch pad for large-scale attacks and data exfiltration.
To tackle the two existing network security problems are ensuring anonymous communications and preventing data exfiltration through network covert channels.

Full browser ?