{"id":18907,"date":"2023-06-10T08:27:12","date_gmt":"2023-06-10T06:27:12","guid":{"rendered":"https:\/\/www.graviton.at\/letterswaplibrary\/where-can-i-find-historical-datasets-on-cyberattacks\/"},"modified":"2023-06-10T08:27:12","modified_gmt":"2023-06-10T06:27:12","slug":"where-can-i-find-historical-datasets-on-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.graviton.at\/letterswaplibrary\/where-can-i-find-historical-datasets-on-cyberattacks\/","title":{"rendered":"Where Can I Find Historical Datasets On Cyberattacks?"},"content":{"rendered":"<p><!-- SC_OFF --><\/p>\n<div class=\"md\">\n<p>I&#8217;m currently in search of datasets that contain historical cyberattacks and their features. More specifically, I am looking at these columns: Type of Malware, Attack Vector, Purpose, Attacker or Groups, Damages Done (in USD or number of people affected), Type of Sector, and Size of the Organization Affected. Any recommendations or sources where I can find such datasets?<\/p>\n<\/div>\n<p><!-- SC_ON -->   submitted by   <a href=\"https:\/\/www.reddit.com\/user\/Much_Pineapple_6027\"> \/u\/Much_Pineapple_6027 <\/a> <br \/> <span><a href=\"https:\/\/www.reddit.com\/r\/datasets\/comments\/144zzeb\/where_can_i_find_historical_datasets_on\/\">[link]<\/a><\/span>   <span><a href=\"https:\/\/www.reddit.com\/r\/datasets\/comments\/144zzeb\/where_can_i_find_historical_datasets_on\/\">[comments]<\/a><\/span><\/p><div class='watch-action'><div class='watch-position align-right'><div class='action-like'><a class='lbg-style1 like-18907 jlk' href='javascript:void(0)' data-task='like' data-post_id='18907' data-nonce='65e0e39b87' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.graviton.at\/letterswaplibrary\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Like' \/><span class='lc-18907 lc'>0<\/span><\/a><\/div><\/div> <div class='status-18907 status align-right'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>I&#8217;m currently in search of datasets that contain historical cyberattacks and their features. More specifically, I am&#8230;<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-18907","post","type-post","status-publish","format-standard","hentry","category-datatards","wpcat-85-id"],"_links":{"self":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/18907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/comments?post=18907"}],"version-history":[{"count":0,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/18907\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/media?parent=18907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/categories?post=18907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/tags?post=18907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}