2020
DOI: 10.1007/978-3-030-58951-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Follow the Blue Bird: A Study on Threat Data Published on Twitter

Abstract: Open Source Intelligence (OSINT) has taken the interest of cybersecurity practitioners due to its completeness and timeliness. In particular, Twitter has proven to be a discussion hub regarding the latest vulnerabilities and exploits. In this paper, we present a study comparing vulnerability databases between themselves and against Twitter. Although there is evidence of OSINT advantages, no methodological studies have addressed the quality and benefits of the sources available. We compare the publishing dates … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 31 publications
0
17
0
Order By: Relevance
“…11 , 12 The creation date of CVE‐ID in NVD is the day when the vulnerability is indexed (it is always public); whereas, in MITER CVE, the creation date is when the CVE‐ID gets reserved. 13 Other vulnerability databases include the Packet Storm 14 and Security Database, 15 which covers vulnerability description, some analysis around possible fixes, mitigation, and known exploits. Since NVD and MITER CVE have strict policies before vulnerability indexing, for this study, both platforms are considered for validating the CVEs reported on Twitter to identify if any vulnerability got disclosed before its indexing.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…11 , 12 The creation date of CVE‐ID in NVD is the day when the vulnerability is indexed (it is always public); whereas, in MITER CVE, the creation date is when the CVE‐ID gets reserved. 13 Other vulnerability databases include the Packet Storm 14 and Security Database, 15 which covers vulnerability description, some analysis around possible fixes, mitigation, and known exploits. Since NVD and MITER CVE have strict policies before vulnerability indexing, for this study, both platforms are considered for validating the CVEs reported on Twitter to identify if any vulnerability got disclosed before its indexing.…”
Section: Introductionmentioning
confidence: 99%
“…Such discussions are done in small groups of 2–13 tweets, but there was no specific account/user to follow for cybersecurity content. 13 …”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations