Group Members Introduction In an era where data privacy is a growing concern, k-anonymity plays a crucial role in protecting sensitive information while preserving data utility. A dataset is k-anonymous if quasi-identifiers for each person in the dataset are identical to at least k – 1 other people also in the dataset [1], making it more difficult for …
Author Archives: Achu Philip
EAGERBEE Malware: A New Variant That Targets Middle East.
The Middle East has always had a mixed history when it comes to cybersecurity measures. While countries like Israel, the UAE, and Saudi Arabia have been on par with global powers in terms of their security strategies, Jordan, Yemen, and Oman have extremely weak cybersecurity measures due to political instability, limited resources, and a lack …
Continue reading “EAGERBEE Malware: A New Variant That Targets Middle East.”
Network Sandbox: Creating a Secured Test Environment
Imagine a playground where you can build, break and rebuild without the fear of consequences! This is the essence of a Network Sandbox. Welcome to our project Network Sandbox: Creating a Secured Test Environment, executed by Maria, Kamaldeep and Achu. A sandbox is an isolated environment on a network that mimics end-user operating environments. They …
Continue reading “Network Sandbox: Creating a Secured Test Environment”
Ascension Healthcare: Yet Another Crippling Ransomware Attack
Hospitals and other healthcare organizations has been a lucrative target for threat actors since the dawn of ransomware attacks. This is primarily due to the volume of sensitive information stored in hospitals like Patients personal information, their medical records and access to diagnostic devices. Some of the industry experts believe that a patients medical and …
Continue reading “Ascension Healthcare: Yet Another Crippling Ransomware Attack”