Datasets:
text stringlengths 113 603k | id stringlengths 47 47 | metadata dict |
|---|---|---|
1 code implementation • 1 Jul 2024 • Luca Pinchetti, Chang Qi, Oleh Lokshyn, Gaspard Olivers, Cornelius Emde, Mufeng Tang, Amine M'Charrak, Simon Frieder, Bayar Menzat, Rafal Bogacz, Thomas Lukasiewicz, Tommaso Salvatori
In this work, we tackle the problems of efficiency and scalability for predictive coding networks i... | <urn:uuid:4b45f961-815e-4543-8311-2cc9fae9b7fb> | {
"probability": 0.9296875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://paperswithcode.com/search?q=author%3ACornelius+Emde",
"date": "2024-09-10T23:13:58",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00339.wa... |
In today's digital landscape, ensuring the security of your applications is more critical than ever. With cyber threats becoming increasingly sophisticated, it's essential to implement robust security measures to protect your applications and data. One effective approach to enhancing your application's security is by l... | <urn:uuid:eec08ab1-226a-4ada-8c70-e56d6bfae9f5> | {
"probability": 0.9765625,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://blog.hyaena.co.uk/posts/how-to-increase-your-applications-security-by-using-open-source-tools-and-software",
"date": "2024-09-07T23:58:12",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/172570065092... |
CVSS 3.1 Score 6.4 of 10 (medium)
CVE-2024-4666 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the Borderless plugin for WordPress, which includes Widgets, Elements, Templates, and Toolkit for Elementor & Gutenberg. The issue lies in the insufficient input sanitization and output escaping of user-suppli... | <urn:uuid:9285d198-540b-43a3-9fd9-ce895f414d72> | {
"probability": 0.98828125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.recordedfuture.com/vulnerability-database/CVE-2024-4666",
"date": "2024-09-15T07:44:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651616.56/warc/CC-MAIN-20240915052902-2024091508290... |
Exploring RAM as an Attack Target
RAM, or Random Access Memory, can be a significant target for attackers seeking to extract valuable information from a personal computer. In this article, we will discuss the methods commonly used to read values from RAM and the access requirements for doing so.
Method to Read Values f... | <urn:uuid:66540372-33bc-4544-8b70-4a15cf70193d> | {
"probability": 0.99609375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.opshool.com/2021/10/12/exploring-ram-as-an-attack-target/",
"date": "2024-09-20T11:43:00",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652246.93/warc/CC-MAIN-20240920090502-20240920120... |
The most valuable asset
“Data is the most valuable asset of every company. It drives business decisions, fuels innovations, and provides competitive advantages. What can be more important than protecting a company’s most valuable asset.”
Data Protection Officer
Data is a company’s most valuable asset because it allows ... | <urn:uuid:31f04a3f-bc64-4266-ad1a-3441b077eb57> | {
"probability": 0.953125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://exfluency.com/ai-and-technology/the-crucial-role-of-data-security-in-modern-business/",
"date": "2024-09-13T12:44:19",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651513.89/warc/CC-MAIN-2024... |
TfL Cyberattack Under Investigation , No Impact on Services Yet
Transport for London (TfL), the city’s transportation authority, is currently investigating an ongoing cyberattack. While the attack is ongoing, TfL has assured the public that there has been no impact on its services.
“We are currently dealing with an ong... | <urn:uuid:bdbd1d23-a9bd-4056-8640-c82c82a7089d> | {
"probability": 0.8828125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://dailysecurityreview.com/security-spotlight/tfl-cyberattack-transport-for-london-under-attack/",
"date": "2024-09-18T02:49:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651835.68/warc/CC-... |
The National Commissioner/CEO, Nigeria Data Protection Commission (NDPC), Dr Vincent Olatunji, has yesterday officially inaugurated the Local Organising Committee (LOC) for the upcoming Network of African Data Protection Authorities (NADPA) conference and Annual General Meeting.
In his inaugural address at the event wh... | <urn:uuid:8ea266bb-24d8-4b9f-a4e2-7efaf305457b> | {
"probability": 0.91796875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.businessremarks.com.ng/ndpc-ceo-olatunji-inaugurates-local-organising-committee-for-nadpa-conference/",
"date": "2024-09-18T08:27:50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/172570065188... |
IronSecureDoc: Revolutionizing Document Security with Cost-Effective Solutions
As digital security becomes increasingly crucial, safeguarding sensitive information is more essential than ever. Though traditional SaaS models provide several solutions, they often fall short due to their cost and limitations. Enter IronSe... | <urn:uuid:4d5c747d-b31d-4720-8827-f31324d07dbf> | {
"probability": 0.890625,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://ppkrace99.info/10-mistakes-that-most-people-make-17/",
"date": "2024-09-19T07:35:48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651995.50/warc/CC-MAIN-20240919061514-20240919091514-00239.w... |
Real Attacks. Real Tools. Real Scenarios. Schedule a demo
Training that transforms behaviours
MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.
Authentic8 transforms how organizations secure and control the use of t... | <urn:uuid:d1cfb4ab-5410-44d8-b334-341126d0dd60> | {
"probability": 0.95703125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.cybersecurityintelligence.com/category/security-monitoring-and-analytics/location/netherlands/apeldoorn/",
"date": "2024-09-10T00:09:26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/172570065... |
A plank portal is the best solution to get secure board communication. It offers state of the art secureness built into the woking platform, which assists prevent data removes and scams. In addition , the website allows you to assessment all your related reports.
Simply because cybercrime continue to be rise in rate, b... | <urn:uuid:190ad34d-7106-42d6-9568-399c7d66a0b0> | {
"probability": 0.90234375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.agenziacentroimmobiliare.it/protect-board-connection/",
"date": "2024-09-10T08:21:08",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-... |
What is Moonhop? Moonhop is a new entrant in the world of meme coins, aiming to capture the essence of viral internet culture while offering potential financial gains. Unlike traditional cryptocurrencies with complex technology and business models, Moonhop leverages the power of memes and social media to gain traction.... | <urn:uuid:ca403f89-5a3c-47ed-8437-0965a6b90039> | {
"probability": 0.89453125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://fredhighfalls.com/a-deep-dive-into-the-meme-coin-craze/",
"date": "2024-09-15T11:15:03",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651622.79/warc/CC-MAIN-20240915084859-20240915114859-00... |
In the realm of cybersecurity, threats are constantly evolving, and staying informed is crucial to protecting your digital assets. Among the various types of cyber threats, spoofing attacks are particularly insidious. These attacks involve deceiving systems or users by impersonating a trusted source, often leading to s... | <urn:uuid:a523d75f-ab3e-4add-8d7e-2f338418f785> | {
"probability": 0.9921875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://hostlika.com/2022/08/29/how-the-ecosystem-approach-helps-startupconnect-for-success/",
"date": "2024-09-16T14:59:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.45/warc/CC-MAIN-2024... |
Singapore’s crypto landscape saw a notable development as OKX’s local branch obtained a Major Payment Institution (MPI) licence from the Monetary Authority of Singapore (MAS). This milestone comes after OKX Singapore received in-principle approval for the licence in February. With this new authorisation, OKX Singapore ... | <urn:uuid:ed959683-40f8-4e4c-9734-98a4c3d8ca5c> | {
"probability": 0.96875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://cryptotale.org/okx-singapore-secures-major-payment-institution-licence/",
"date": "2024-09-20T10:58:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652246.93/warc/CC-MAIN-20240920090502-2024... |
Solana's PoH offers unprecedented transaction speeds and negligible fees, opening up opportunities for businesses reliant on high volumes and micropayment models.
PoH provides a secure foundation for applications like supply chain management, financial services, and digital asset ownership where trust and verifiable hi... | <urn:uuid:88833fa8-b805-497d-8d17-e42a77fc15d9> | {
"probability": 0.9921875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://tokenminds.co/blog/knowledge-base/solana-proof-of-history",
"date": "2024-09-11T12:48:40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651387.63/warc/CC-MAIN-20240911120037-20240911150037-0... |
If you manage an online store, one of your priorities should be preventing fraud and preserving your client’s personal information. Your online store’s security is at risk, so you should implement multiple fraud management solutions to protect it from hackers.
You can learn to spot typical forms of online shopping frau... | <urn:uuid:5469317d-a825-41bf-86bf-c2f092e946dc> | {
"probability": 0.94921875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://efoli.com/blog/how-to-protect-your-business-from-ecommerce-fraud/",
"date": "2024-09-13T02:04:08",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651506.7/warc/CC-MAIN-20240913002450-20240913... |
Wormhole3 is now live on testnet, don't miss the OG role and share the 300 USDT
On August 17th, Wormhole3 launched the testnet. It is expected to go live on the mainnet at the end of September!
Testnet is used for testing and experimentation without risk to real funds or the main chain. To deliver a well-optimized prod... | <urn:uuid:32d89312-701c-4c09-83e7-7ecc21f6427b> | {
"probability": 0.97265625,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://steemit.com/wormhole3/@wormhole3/wormhole3-is-now-live-on-testnet-don-t-miss-the-og-role-and-share-the-300-usdt",
"date": "2024-09-08T15:47:27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/172570... |
The SFC has granted multiple licenses since the city opened doors to retail crypto trading last August.
Less than a year after Hong Kong regulators approved crypto exchanges, traditional financial institutions and brokerages alike have been keen to obtain their digital asset licenses for trading.
In January, Chinese st... | <urn:uuid:9ba0c0cd-89ab-402a-bab1-dd3f358acbb7> | {
"probability": 0.91015625,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://x.superex.com/news/blockchain/4665/",
"date": "2024-09-12T06:55:47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651422.16/warc/CC-MAIN-20240912043139-20240912073139-00139.warc.gz",
"lan... |
The Instagram account of fast-food giant McDonald’s, which has more than 5 million followers, was hacked on Thursday, concomitantly with the personal X and Instagram accounts of Guillaume Huin, a senior marketing director at McDonald’s, according to a report from the New York Post.
The hijackers’ crypto scam promoted a... | <urn:uuid:45b39aae-91be-4c2a-8cfa-b3d7b8c700bb> | {
"probability": 0.9375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.technadu.com/mcdonalds-instagram-account-hijacked-crypto-scam/546501/",
"date": "2024-09-15T13:19:01",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651630.14/warc/CC-MAIN-20240915120545-202... |
Abu Dhabi: Your seemingly innocent vacation photos could prove to be a boon for cybercriminals. That’s the stark warning from the UAE Cyber Security Council, which says personal images shared online can be a gateway to cyberbullying, identity theft, blackmail, and other forms of cyber threats.
The council urged the pub... | <urn:uuid:b43890e0-b6c8-4d3c-a66d-ee3445bab411> | {
"probability": 0.91796875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://gulfnews.com/uae/uae-cyber-security-council-warns-residents-against-sharing-personal-images-online-while-on-holiday-1.103689869",
"date": "2024-09-17T09:21:35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38... |
Toronto school board confirms students’ info stolen as LockBit claims breach
The Toronto District School Board (TDSB) confirmed this week that the information of students was involved in a ransomware attack discovered in June.
TDSB initially said the cybercriminals targeted a technology testing environment that is sepa... | <urn:uuid:2fc057fc-d500-47f0-b519-d7a314b74e4d> | {
"probability": 0.88671875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://therecord.media/toronto-school-district-board-ransomware",
"date": "2024-09-08T19:51:35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651017.43/warc/CC-MAIN-20240908181815-20240908211815-0... |
Secure dynamic bits standard scheme in private cloud environment Online publication date: Wed, 05-Oct-2022
by Ghanshyam Gagged; S.M. Jaishakti
International Journal of Internet Protocol Technology (IJIPT), Vol. 15, No. 3/4, 2022
Abstract: Cloud computing is progressively prevalent prototype for retrieving the resources... | <urn:uuid:5c196bb5-0205-4b69-a700-064286d1985a> | {
"probability": 0.98046875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.inderscience.com/offers.php?id=125958",
"date": "2024-09-10T15:00:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651255.81/warc/CC-MAIN-20240910125411-20240910155411-00889.warc.gz",
... |
"Organizations Fail to Log 44% of Cyber Attacks, Major Exposure Gaps Remain"
According to Picus Security, 40 percent of tested environments enabled attack paths leading to domain admin access. Since domain admin access is the highest level of access within an organization's Information Technology (IT) infrastructure, i... | <urn:uuid:85d0bde3-8e93-4bb0-89b5-54d1de0fc34a> | {
"probability": 0.95703125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://sos-vo.org/news/organizations-fail-log-44-cyber-attacks-major-exposure-gaps-remain",
"date": "2024-09-11T15:49:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651390.33/warc/CC-MAIN-20240... |
This month's featured article
Creation of a Healthy Cyber Ecosystem
YANO Makoto President, RIETI
Fiscal 2019 marks the final year of RIETI's fourth medium-term plan covering the four-year period beginning in April 2016. The main goal of this plan is to determine the relationship between emerging industrial technology—a... | <urn:uuid:c549052b-15b5-41cb-9c82-7a1a1df8fb36> | {
"probability": 0.96875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.rieti.go.jp/en/rieti_report/230.html",
"date": "2024-09-09T11:28:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651098.19/warc/CC-MAIN-20240909103148-20240909133148-00864.warc.gz",
"l... |
3rd November 2022, Kathmandu
The website of the Public Service Commission of Madhesh state has been hacked. The hacker has placed promotional materials for cryptocurrencies on the website.
After opening the website, when trying to skip the information placed there, the site is redirected to a page with promotional cont... | <urn:uuid:3fd8b003-0c4e-453b-b13d-c2397f398f12> | {
"probability": 0.92578125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://ictframe.com/public-service-commissions-madhesh-state-website-hacked/",
"date": "2024-09-13T15:51:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651523.40/warc/CC-MAIN-20240913133933-202... |
In today’s digitally connected world, the rise of artificial intelligence (AI) has brought about not only innovative solutions but also new avenues for fraudsters to exploit. AI voice scams, in particular, have become increasingly prevalent, posing a significant threat to individuals’ financial security. Here at Refund... | <urn:uuid:310a3d62-d18d-4102-a509-b59ae3db6425> | {
"probability": 0.92578125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://refundaroo.com/category/credit-card-phishing/",
"date": "2024-09-13T17:41:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651535.66/warc/CC-MAIN-20240913165920-20240913195920-00064.warc.g... |
The hackers behind REvil, Netwalker, and Conti ransomware have once again posted personal and protected health information they claim to have stolen from three providers in separate, targeted cyberattacks in an effort to leverage a ransom demand from the victims.
The latest data leaks demonstrate the prolific nature of... | <urn:uuid:1fb239d7-1e3a-4d9c-9832-111cf3595409> | {
"probability": 0.96484375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.techtarget.com/healthtechsecurity/news/366595524/Ransomware-Hacking-Groups-Steal-Leak-Data-From-3-More-Providers",
"date": "2024-09-08T06:08:42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1... |
Wall Street Market Darknet Review
If your personal information is stolen, monitor your credit report for unauthorized activity or accounts. You can also freeze your credit report for a year after you have been a victim of a data breach. This ensures credit reporting agencies will not provide your credit report if anyon... | <urn:uuid:91d78647-4ed1-4eeb-b993-e7562b4cdca9> | {
"probability": 0.9375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://darkwebmarketonion.com/best-darknet-market-2024/",
"date": "2024-09-19T21:44:55",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652067.20/warc/CC-MAIN-20240919194038-20240919224038-00464.warc.gz... |
From a fundamental perspective, why did Grayscale choose Sui?
On August 7, Grayscale announced the launch of two new trust funds, Grayscale Sui Trust and Grayscale Bittensor Trust. Grayscale Sui Trust will only invest in Sui network native token SUI. This is the second time that Grayscale has chosen to launch a special... | <urn:uuid:2c78df59-672b-46d8-ab53-2c4df1dd3834> | {
"probability": 0.8828125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.bee.com/23513.html",
"date": "2024-09-08T00:17:12",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650926.21/warc/CC-MAIN-20240907225010-20240908015010-00864.warc.gz",
"language": "en",
... |
What is Fern?
"Fren" is an informal, friendly variation of the word "friend." It is frequently used in online communities and social media to express a sense of camaraderie and approachability.
What Fern Means in the Crypto Context
In the crypnocurrency realm, "fren" denotes fellow community members, traders, or enthus... | <urn:uuid:78f57cd9-fee3-4f3e-b03d-a61a7d1442a9> | {
"probability": 0.90234375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://explore.m2.com/glossary/fern",
"date": "2024-09-12T19:12:03",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651491.39/warc/CC-MAIN-20240912174615-20240912204615-00364.warc.gz",
"language":... |
In cryptography, the common reference string (CRS) model captures the assumption that a trusted setup in which all involved parties get access to the same string crs taken from some distribution D exists. Schemes proven secure in the CRS model are secure given that the setup was performed correctly. The common referenc... | <urn:uuid:1b937dd9-f339-48d5-b795-9cb37b3e4e27> | {
"probability": 0.9765625,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.wikiwand.com/en/articles/Common_reference_string_model",
"date": "2024-09-08T10:04:27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650976.41/warc/CC-MAIN-20240908083737-20240908113737-... |
The evolution of the Web3 ecosystem confronts pivotal challenges such as network fragmentation, scalability constraints, cross-chain integration complexities, and security vulnerabilities. To address these issues, we introduce the KRNL Protocol—an orchestration and verification engine that seamlessly integrates permiss... | <urn:uuid:f7052bf1-6cb8-4748-8d38-2b559f21b50b> | {
"probability": 0.984375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://ethresear.ch/t/a-node-based-solution-to-execution-sharding-the-krnl-protocol/20268",
"date": "2024-09-18T14:50:57",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651899.75/warc/CC-MAIN-2024091... |
Table of contents
Polygon, which started as a layer-2 scaling solution is now an ETHEREUM ECOSYSTEM and is slowly becoming the Ethereum's SHIELD. Let's see both Standalone and Ecosystem services it offer.
Standalone Benefits of Polygon
One of the main issues with Ethereum is its scalability. As more and more people use... | <urn:uuid:5ac29951-2229-4112-bc98-d5e02a1bbe2f> | {
"probability": 0.95703125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://blog.moayaan.com/polygon-the-shield-of-ethereum",
"date": "2024-09-19T14:26:35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652031.71/warc/CC-MAIN-20240919125821-20240919155821-00264.warc... |
The average amount of theft from citizens’ bank accounts, according to the Bank of Russia, increased by 30% in 2022; last year, more than 13 billion rubles were stolen from clients of credit institutions, said Alexander Stekolnikov, member of the Opora Rossii digital economy committee. The expert told Izvestia what met... | <urn:uuid:4c75ffcb-24f7-4f75-8379-0732b600ddb8> | {
"probability": 0.91796875,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://weeklyblitz.net/2023/03/07/the-expert-speaks-about-the-types-of-fraud-with-bank-cards/",
"date": "2024-09-17T01:26:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651722.42/warc/CC-MAIN-2... |
Located at 1007 7th St flr 4, Sacramento, CA, Group One specializes in advanced IT and cybersecurity solutions. With over a decade of experience, their clientele ranges from small businesses to large enterprises. According to a review from a medium-sized tech firm, “Group One’s expertise in cybersecurity is unparallele... | <urn:uuid:ab623728-e772-447b-a6fa-4be896125fbc> | {
"probability": 0.95703125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.cloudsecuretech.com/profile/group-one/",
"date": "2024-09-10T09:52:17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651241.17/warc/CC-MAIN-20240910093422-20240910123422-00714.warc.gz",... |
Raise Your IQ – Networking + Careers
Join us Tuesday, Aug. 13 from 9am to 11am at the Bleachers at HQO
Raise Your IQ: Networking & Careers is an engaging and interactive event designed to boost your career development and networking skills! During this event, you'll connect with industry leaders who will share their in... | <urn:uuid:b0e6ee55-7bf5-48e3-9437-3182831b51f0> | {
"probability": 0.92578125,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://www.cicpindiana.com/cicp-resource/raise-your-iq-networking-careers/",
"date": "2024-09-09T02:09:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651053.52/warc/CC-MAIN-20240909004517-20240... |
if you want an immediate answer no, using Ai Crypto Trading Bots Are not Illegal. but it has more to it. issue of using artificial intelligence in the financial markets is very controversial in terms of its compliance with the law and regulations. It raises the question whether the use of artificial intelligence and th... | <urn:uuid:4b92619e-1db1-44af-929a-513407081b66> | {
"probability": 0.8984375,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://blog.metaset.ai/trading-bots/is-ai-crypto-trading-bot-illegal/",
"date": "2024-09-18T11:01:12",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651895.12/warc/CC-MAIN-20240918100941-20240918130... |
In the ever-evolving world of cyber threats, a robust security solution is more than just a luxury—it’s a necessity. Norton Internet Security stands out as a comprehensive suite designed to protect your digital life from every angle. Whether you’re browsing social media, streaming videos, or simply working online, Nort... | <urn:uuid:cfee1027-9049-4311-a411-d0b6bc7c3072> | {
"probability": 0.91015625,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://sitemcafee.com/norton-internet-security/",
"date": "2024-09-14T07:59:36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651559.58/warc/CC-MAIN-20240914061427-20240914091427-00464.warc.gz",
... |
Advancing the security of record management of record management in education using blockchain technology
A. Sekinat Olaniyan,
O. Motunrayo Moradeyo,
O. Peter Popoola and
A. Adekunle Araromi
EconStor Research Reports from ZBW - Leibniz Information Centre for Economics
Blockchain technology has gained considerable atten... | <urn:uuid:c30924a1-b60a-4c9f-a24f-ed6c33641016> | {
"probability": 0.91015625,
"relevant": true,
"dump": "CC-MAIN-2024-38",
"url": "https://econpapers.repec.org/paper/zbwesrepo/268372.htm",
"date": "2024-09-12T10:20:47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651440.11/warc/CC-MAIN-20240912074814-20240912104814-00164.warc... |
Dataset Card for RedSage-CFW
RedSage: A Cybersecurity Generalist LLM" (ICLR 2026).
Authors: Naufal Suryanto1, Muzammal Naseer1†, Pengfei Li1, Syed Talal Wasim2, Jinhui Yi2, Juergen Gall2, Paolo Ceravolo3, Ernesto Damiani3
1Khalifa University, 2University of Bonn, 3University of Milan
†Project Lead
🌐 Project Page |
🤖 Model Collection |
📊 Benchmark Collection |
📘 Data Collection
Dataset Summary
RedSage-CFW (CyberFineWeb) is a large-scale, cybersecurity dataset designed for the continual pretraining of Large Language Models (LLMs). It consists of approximately 11.7 billion tokens spanning 13 million documents.
The dataset was constructed by filtering the FineWeb corpus (Common Crawl 2013–2024) using a custom ModernBERT-based classifier to identify cybersecurity-relevant content. To prevent catastrophic forgetting of general capabilities during pretraining, the cybersecurity data is mixed with general educational content from FineWeb-Edu.
Supported Tasks
- Continual Pretraining: Designed to adapt general-purpose LLMs (e.g., Qwen, Llama) to the cybersecurity domain.
- Domain Adaptation: Enhances model performance on cybersecurity knowledge, skills, and tool usage
Languages
The dataset primarily consists of English text, derived from Common Crawl sources.
Dataset Structure
Data Instances
The dataset is partitioned into 5 chunks (config names: chunk_1 through chunk_5). Each instance represents a single document (e.g., a web page, article, or forum post).
Data Fields
Based on the provided configuration, the data fields are:
text(string): The full text content of the document.id(string): A unique identifier for the document.metadata(struct): Contains detailed attributes about the source and filtering:probability(float64): The confidence score from the cybersecurity classifier.relevant(bool): A flag indicating if the document passed the relevance filter.url(string): The source URL of the document.date(timestamp): The crawl or publication date.dump(string): The Common Crawl dump identifier (e.g.,CC-MAIN-2024-51).file_path(string): Path information for the original file.language(string): The detected language of the text.language_score(float64): Confidence score of the language detection.token_count(int64): The number of tokens in the document.score,int_score: Additional quality or relevance metrics.
Data Splits
The dataset is segmented into 5 chunks. The paper notes that the final corpus consists of the "latest 5 chunks" from the filtered pipeline to fit training budgets.
- Total Size: ~11.7B tokens.
- Total Documents: ~13M documents.
Dataset Creation
Curation Rationale
Existing cybersecurity solutions often rely on proprietary APIs or lack domain adaptation. RedSage-CFW bridges this gap by providing a transparent, open-source corpus for training local, privacy-preserving cybersecurity assistants.
Source Data
- FineWeb: The base corpus is FineWeb, aggregated from 104 Common Crawl subsets between Summer 2013 and December 2024 (~17.2T tokens).
- FineWeb-Edu: Used for mixing general knowledge to maintain reasoning capabilities.
Data Processing & Filtering
- Classifier Training: A binary classifier based on ModernBERT-base was trained on the "Cybersecurity Topic Classification" dataset (sourced from Reddit, StackExchange, and arXiv). It achieved 97.3% accuracy on validation.
- Filtering: This classifier was applied to FineWeb, identifying ~125M cybersecurity-relevant documents (~89.8B tokens).
- General Knowledge Replay: To avoid catastrophic forgetting, the cybersecurity data was mixed with FineWeb-Edu samples at a 30% replay ratio.
- Deduplication: Global deduplication was performed using MinHash-LSH (via DataTrove), reducing the corpus size by ~47.9% in tokens.
- Chunking: The final dataset comprises the latest 5 chronological chunks from the processed data to manage computational costs.
Considerations for Using the Data
Social Impact
The dataset enables the development of open-source cybersecurity assistants, potentially helping to bridge the global skills shortage in the field.
Discussion of Biases and Limitations
- Source Bias: As a web-crawled dataset, it may inherit biases present in Common Crawl and online cybersecurity discussions.
- Dual Use: The dataset may contains offensive security knowledge (e.g., penetration testing techniques). While intended for defense, there is an inherent risk of misuse.
Citation
@inproceedings{suryanto2026redsage,
title={RedSage: A Cybersecurity Generalist {LLM}},
author={Naufal Suryanto and Muzammal Naseer and Pengfei Li and Syed Talal Wasim and Jinhui Yi and Juergen Gall and Paolo Ceravolo and Ernesto Damiani},
booktitle={The Fourteenth International Conference on Learning Representations},
year={2026},
url={https://openreview.net/forum?id=W4FAenIrQ2}
}
- Downloads last month
- 258