text stringlengths 167 252 | label stringclasses 4
values |
|---|---|
SQL injection against ict service management databases resulting in none data breach across 3 records systems. [SEP] disruption: complete entities: 3 sectors: 3 cascading: none data_compromise: none | T3 |
API abuse affecting education cloud services causing significant rate limiting and outages. [SEP] disruption: significant entities: 12 sectors: 1 cascading: limited data_compromise: operational | T2 |
Ransomware-as-a-service targeting education SMEs leading to partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none | T1 |
Ransomware incident on public administration provider causing sustained disruption to core services reaching 5 entities across 5 sectors. [SEP] disruption: sustained entities: 5 sectors: 5 cascading: limited data_compromise: systemic | T4 |
Ransomware-as-a-service targeting education SMEs causing partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none | T1 |
Hardware implant discovered in waste water network equipment with systemic persistent surveillance capability. [SEP] disruption: sustained entities: 8 sectors: 3 cascading: limited data_compromise: systemic | T4 |
Deepfake-assisted social engineering targeting public administration leadership with none access to 10 strategic services. [SEP] disruption: partial entities: 10 sectors: 1 cascading: none data_compromise: none | T1 |
Botnet infection across space endpoints with significant service degradation reaching 10 sites. [SEP] disruption: significant entities: 10 sectors: 1 cascading: cross_sector data_compromise: sensitive | T3 |
Data poisoning attack on digital infrastructure machine learning models with none integrity compromise. [SEP] disruption: partial entities: 3 sectors: 2 cascading: none data_compromise: none | T1 |
DDoS campaign targeting research infrastructure leading in sustained service degradation for 1 downstream institutions. [SEP] disruption: sustained entities: 1 sectors: 3 cascading: none data_compromise: none | T4 |
Operational technology network bridge exploit in banking causing partial safety system degradation. [SEP] disruption: partial entities: 12 sectors: 1 cascading: none data_compromise: operational | T2 |
Zero-day exploitation in research control systems causing partial operational disruption. [SEP] disruption: partial entities: 2 sectors: 3 cascading: none data_compromise: none | T1 |
Container escape in waste management Kubernetes clusters causing none lateral movement across 3 namespaces. [SEP] disruption: sustained entities: 55 sectors: 3 cascading: none data_compromise: sensitive | T4 |
Side-channel intrusion on banking cryptographic hardware with systemic key material exposure. [SEP] disruption: significant entities: 3 sectors: 1 cascading: limited data_compromise: systemic | T4 |
Advanced persistent threat targeting waste management networks with none cascading effects across 1 sectors. [SEP] disruption: significant entities: 12 sectors: 1 cascading: none data_compromise: systemic | T4 |
Social engineering attack on health help desk leading to systemic data access for 1 accounts. [SEP] disruption: significant entities: 1 sectors: 2 cascading: none data_compromise: systemic | T4 |
DNS hijacking affecting health domain resolution causing partial service disruption for 8 organizations. [SEP] disruption: partial entities: 8 sectors: 3 cascading: limited data_compromise: none | T2 |
Vulnerability in public administration VPN gateway exploited for none data exfiltration from 1 endpoints. [SEP] disruption: partial entities: 1 sectors: 2 cascading: none data_compromise: none | T1 |
Memory corruption exploit in financial market SCADA systems causing significant process control disruption. [SEP] disruption: significant entities: 12 sectors: 2 cascading: uncontrolled data_compromise: none | T2 |
Container escape in ict service management Kubernetes clusters causing none lateral movement across 2 namespaces. [SEP] disruption: significant entities: 12 sectors: 2 cascading: none data_compromise: none | T2 |
Privilege escalation in digital providers active directory resulting in none lateral movement across 2 network segments. [SEP] disruption: complete entities: 55 sectors: 2 cascading: none data_compromise: none | T3 |
OAuth token theft from ict service management identity providers impacting 8 federated services. [SEP] disruption: partial entities: 8 sectors: 1 cascading: none data_compromise: none | T1 |
Memory corruption exploit in financial market SCADA systems causing significant process control disruption. [SEP] disruption: significant entities: 12 sectors: 2 cascading: uncontrolled data_compromise: none | T2 |
Configuration error in manufacturing firewall rules exposing none data to unauthorized access. [SEP] disruption: partial entities: 5 sectors: 1 cascading: none data_compromise: none | T1 |
Log4j-style vulnerability in waste water Java applications reaching 10 instances with significant service impact. [SEP] disruption: significant entities: 10 sectors: 1 cascading: none data_compromise: sensitive | T3 |
DDoS campaign impacting food production infrastructure ending in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none | T1 |
Bluetooth vulnerability exploited in ict service management medical devices affecting 25 hospital systems. [SEP] disruption: sustained entities: 25 sectors: 1 cascading: none data_compromise: systemic | T4 |
SIM swapping attack targeting ict service management executives leading to sensitive two-factor bypass for 2 accounts. [SEP] disruption: sustained entities: 2 sectors: 1 cascading: cross_sector data_compromise: sensitive | T4 |
Wiper malware launched against ict service management networks causing partial destruction of operational data. [SEP] disruption: partial entities: 1 sectors: 2 cascading: limited data_compromise: none | T2 |
Memory corruption exploit in financial market SCADA systems resulting in sustained process control degradation. [SEP] disruption: sustained entities: 10 sectors: 1 cascading: none data_compromise: sensitive | T4 |
Cloud misconfiguration exposing health storage buckets with sensitive data of 2 customers. [SEP] disruption: significant entities: 2 sectors: 2 cascading: uncontrolled data_compromise: sensitive | T3 |
Third-party cloud provider outage affecting financial market hosted services with sustained interruption across 2 dependent sectors. [SEP] disruption: sustained entities: 5 sectors: 2 cascading: none data_compromise: none | T4 |
With trojanized packages affecting 10 developers, typosquatting campaign hitting food production supply chain. [SEP] disruption: sustained entities: 10 sectors: 2 cascading: uncontrolled data_compromise: none | T4 |
OAuth token theft from space identity providers affecting 12 federated services. [SEP] disruption: partial entities: 12 sectors: 2 cascading: limited data_compromise: none | T2 |
Wiper malware launched against health networks causing sustained destruction of operational data. [SEP] disruption: sustained entities: 25 sectors: 2 cascading: none data_compromise: none | T4 |
With systemic credential harvesting, watering hole intrusion targeting research personnel websites. [SEP] disruption: complete entities: 12 sectors: 2 cascading: cross_sector data_compromise: systemic | T4 |
With trojanized packages touching 150 developers, typosquatting campaign affecting financial market supply chain. [SEP] disruption: complete entities: 150 sectors: 2 cascading: limited data_compromise: none | T3 |
OAuth token theft from energy identity providers affecting 8 federated services. [SEP] disruption: partial entities: 8 sectors: 1 cascading: none data_compromise: none | T1 |
Container escape in chemicals Kubernetes clusters causing limited lateral movement across 2 namespaces. [SEP] disruption: complete entities: 1 sectors: 2 cascading: limited data_compromise: systemic | T4 |
Cloud misconfiguration exposing manufacturing storage buckets with sensitive data of 12 customers. [SEP] disruption: complete entities: 12 sectors: 3 cascading: none data_compromise: sensitive | T3 |
SSH key compromise in chemicals jump servers enabling limited lateral access across 2 network zones. [SEP] disruption: significant entities: 3 sectors: 2 cascading: limited data_compromise: sensitive | T3 |
Mass scanning and exploitation campaign against research exposed services affecting 2 unpatched systems. [SEP] disruption: partial entities: 2 sectors: 1 cascading: none data_compromise: none | T1 |
With none credential theft impacting 5 entities, phishing campaign against chemicals operators. [SEP] disruption: complete entities: 5 sectors: 2 cascading: uncontrolled data_compromise: none | T4 |
WebSocket injection in financial market real-time networks producing significant session disruption for 5 active connections. [SEP] disruption: significant entities: 5 sectors: 2 cascading: limited data_compromise: systemic | T4 |
DDoS campaign impacting transport infrastructure resulting in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none | T1 |
Operational technology network bridge exploit in ict service management causing sustained safety system degradation. [SEP] disruption: sustained entities: 5 sectors: 5 cascading: uncontrolled data_compromise: operational | T4 |
API abuse hitting ict service management cloud services triggering partial rate limiting and outages. [SEP] disruption: partial entities: 8 sectors: 3 cascading: none data_compromise: none | T1 |
Wiper malware deployed against digital providers systems causing partial destruction of operational data. [SEP] disruption: partial entities: 3 sectors: 2 cascading: cross_sector data_compromise: none | T3 |
WebSocket injection in drinking water real-time systems leading to partial session outage for 2 active connections. [SEP] disruption: partial entities: 2 sectors: 1 cascading: limited data_compromise: none | T2 |
Ransomware-as-a-service targeting waste water SMEs causing partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none | T1 |
With partial service impact, log4j-style vulnerability in manufacturing java applications reaching 10 instances. [SEP] disruption: partial entities: 10 sectors: 2 cascading: cross_sector data_compromise: operational | T3 |
Memory corruption exploit in waste water SCADA systems triggering significant process control interruption. [SEP] disruption: significant entities: 55 sectors: 1 cascading: cross_sector data_compromise: operational | T3 |
Man-in-the-middle attack intercepting ict service management communications with systemic data exposure. [SEP] disruption: sustained entities: 5 sectors: 1 cascading: none data_compromise: systemic | T4 |
Supply chain compromise through digital providers software vendor leading to operational data compromise across 12 client organizations. [SEP] disruption: significant entities: 12 sectors: 1 cascading: none data_compromise: operational | T2 |
Wiper malware deployed against banking systems causing sustained destruction of operational data. [SEP] disruption: sustained entities: 150 sectors: 3 cascading: uncontrolled data_compromise: operational | T4 |
Zero-day exploitation in health control systems causing partial operational outage. [SEP] disruption: partial entities: 2 sectors: 2 cascading: none data_compromise: none | T1 |
Insider threat at waste management facility concluding in none data compromise affecting 10 connected entities. [SEP] disruption: partial entities: 10 sectors: 3 cascading: limited data_compromise: none | T2 |
Container escape in energy Kubernetes clusters causing uncontrolled lateral movement across 3 namespaces. [SEP] disruption: significant entities: 25 sectors: 3 cascading: uncontrolled data_compromise: operational | T2 |
SIM swapping attack targeting digital providers executives leading to sensitive two-factor bypass for 3 accounts. [SEP] disruption: significant entities: 3 sectors: 1 cascading: limited data_compromise: sensitive | T3 |
SSH key compromise in ict service management jump servers enabling cross sector lateral access across 1 network zones. [SEP] disruption: sustained entities: 150 sectors: 1 cascading: cross_sector data_compromise: systemic | T4 |
Typosquatting campaign targeting research supply chain with trojanized packages reaching 2 developers. [SEP] disruption: complete entities: 2 sectors: 2 cascading: cross_sector data_compromise: systemic | T4 |
Watering hole attack targeting postal courier personnel websites with sensitive credential harvesting. [SEP] disruption: complete entities: 10 sectors: 1 cascading: limited data_compromise: sensitive | T3 |
DDoS campaign targeting food production infrastructure resulting in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none | T1 |
Supply chain compromise through chemicals software vendor leading to systemic data exposure across 55 client operators. [SEP] disruption: complete entities: 55 sectors: 3 cascading: none data_compromise: systemic | T4 |
SSH key compromise in ict service management jump servers enabling uncontrolled lateral access across 1 network zones. [SEP] disruption: sustained entities: 55 sectors: 1 cascading: uncontrolled data_compromise: operational | T4 |
Botnet infection across education endpoints with significant service degradation affecting 10 sites. [SEP] disruption: significant entities: 10 sectors: 1 cascading: uncontrolled data_compromise: operational | T2 |
Mass scanning and exploitation campaign against drinking water exposed services affecting 3 unpatched systems. [SEP] disruption: significant entities: 3 sectors: 1 cascading: none data_compromise: operational | T2 |
SSH key compromise in space jump servers enabling cross sector lateral access across 1 network zones. [SEP] disruption: complete entities: 2 sectors: 1 cascading: cross_sector data_compromise: operational | T3 |
Typosquatting campaign targeting digital infrastructure supply chain with trojanized packages affecting 1 developers. [SEP] disruption: significant entities: 1 sectors: 3 cascading: none data_compromise: none | T2 |
Mass scanning and exploitation campaign against digital providers exposed services affecting 10 unpatched systems. [SEP] disruption: significant entities: 10 sectors: 1 cascading: limited data_compromise: none | T2 |
SIM swapping breach targeting public administration executives leading to sensitive two-factor bypass for 2 accounts. [SEP] disruption: significant entities: 2 sectors: 5 cascading: cross_sector data_compromise: sensitive | T3 |
OAuth token theft from manufacturing identity providers affecting 1 federated services. [SEP] disruption: partial entities: 1 sectors: 3 cascading: none data_compromise: none | T1 |
Ransomware-as-a-service hitting waste water SMEs causing partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none | T1 |
Mass scanning and exploitation campaign against education exposed services affecting 3 unpatched infrastructure. [SEP] disruption: sustained entities: 3 sectors: 5 cascading: uncontrolled data_compromise: sensitive | T4 |
SQL injection against digital providers databases ending in operational data breach across 3 records infrastructure. [SEP] disruption: significant entities: 3 sectors: 2 cascading: uncontrolled data_compromise: operational | T2 |
DDoS campaign targeting food production infrastructure resulting in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none | T1 |
OAuth token theft from manufacturing identity providers affecting 1 federated services. [SEP] disruption: partial entities: 1 sectors: 3 cascading: none data_compromise: none | T1 |
USB-based malware introduced into energy air-gapped systems triggering operational data bridge. [SEP] disruption: significant entities: 12 sectors: 2 cascading: none data_compromise: operational | T2 |
Vulnerability in postal courier VPN gateway exploited for none data exfiltration from 3 endpoints. [SEP] disruption: complete entities: 3 sectors: 5 cascading: uncontrolled data_compromise: none | T4 |
Vulnerability in chemicals VPN gateway exploited for operational data exfiltration from 1 endpoints. [SEP] disruption: partial entities: 1 sectors: 1 cascading: limited data_compromise: operational | T2 |
Malicious update pushed to digital infrastructure monitoring software affecting 12 installations with cross sector cascading impact. [SEP] disruption: significant entities: 12 sectors: 5 cascading: cross_sector data_compromise: systemic | T4 |
Watering hole attack targeting chemicals personnel websites with none credential harvesting. [SEP] disruption: partial entities: 3 sectors: 3 cascading: none data_compromise: none | T1 |
Zero-day exploitation in public administration control infrastructure resulting in partial operational degradation. [SEP] disruption: partial entities: 2 sectors: 2 cascading: none data_compromise: none | T1 |
Certificate authority compromise touching transport trust chains with none cascading trust failures across 1 domains. [SEP] disruption: partial entities: 5 sectors: 1 cascading: none data_compromise: operational | T2 |
Firmware tampering in health IoT devices resulting in uncontrolled cascading failures in 5 sectors. [SEP] disruption: sustained entities: 12 sectors: 5 cascading: uncontrolled data_compromise: sensitive | T4 |
Watering hole attack targeting education personnel websites with systemic credential harvesting. [SEP] disruption: sustained entities: 1 sectors: 2 cascading: limited data_compromise: systemic | T4 |
Configuration error in space firewall rules exposing operational data to unauthorized access. [SEP] disruption: partial entities: 12 sectors: 2 cascading: limited data_compromise: operational | T2 |
Malicious update pushed to waste water monitoring software affecting 5 installations with cross sector cascading impact. [SEP] disruption: partial entities: 5 sectors: 1 cascading: cross_sector data_compromise: systemic | T4 |
Operational technology network bridge exploit in manufacturing producing significant safety system degradation. [SEP] disruption: significant entities: 1 sectors: 1 cascading: none data_compromise: none | T2 |
Data poisoning intrusion on ict service management machine learning models with operational integrity compromise. [SEP] disruption: significant entities: 2 sectors: 1 cascading: none data_compromise: operational | T2 |
Mass scanning and exploitation campaign against research exposed services affecting 2 unpatched systems. [SEP] disruption: partial entities: 2 sectors: 1 cascading: none data_compromise: none | T1 |
Power grid cyber-physical attack on transport SCADA leading to partial disruption with none cascading effects. [SEP] disruption: partial entities: 3 sectors: 1 cascading: none data_compromise: none | T1 |
Zero-day exploitation in health control systems causing partial operational outage. [SEP] disruption: partial entities: 2 sectors: 2 cascading: none data_compromise: none | T1 |
Business email compromise targeting postal courier financial operations with sensitive transaction data exposure. [SEP] disruption: complete entities: 55 sectors: 2 cascading: cross_sector data_compromise: sensitive | T3 |
Firmware tampering in food production IoT devices causing none cascading failures in 1 sectors. [SEP] disruption: sustained entities: 5 sectors: 1 cascading: none data_compromise: operational | T4 |
Zero-day exploitation in research control platforms triggering partial operational impairment. [SEP] disruption: partial entities: 2 sectors: 3 cascading: none data_compromise: none | T1 |
Privilege escalation in waste water active directory causing limited lateral movement across 1 network segments. [SEP] disruption: significant entities: 150 sectors: 1 cascading: limited data_compromise: operational | T3 |
USB-based malware introduced into food production air-gapped systems leading to operational data bridge. [SEP] disruption: significant entities: 55 sectors: 3 cascading: cross_sector data_compromise: operational | T3 |
With sensitive data of 12 customers, cloud misconfiguration exposing energy storage buckets. [SEP] disruption: significant entities: 12 sectors: 2 cascading: uncontrolled data_compromise: sensitive | T3 |
DNS hijacking affecting education domain resolution causing partial service disruption for 12 organizations. [SEP] disruption: partial entities: 12 sectors: 2 cascading: cross_sector data_compromise: none | T3 |
End of preview. Expand in Data Studio
CyberScale Technical Severity Training Data
Training dataset for the CyberScale incident technical severity classifier (Phase 3 T-model). Contains 8,000 parametric incident scenarios with deterministic T1-T4 labels.
Schema
| Column | Type | Description |
|---|---|---|
text |
string | Formatted input: <description> [SEP] disruption: <level> entities: <N> sectors: <N> cascading: <level> data_compromise: <level> |
label |
string | Technical severity level (T1/T2/T3/T4) |
Class Distribution
| Label | Count |
|---|---|
| T1 | 2,000 |
| T2 | 2,000 |
| T3 | 2,000 |
| T4 | 2,000 |
Citation
Part of the CyberScale project — multi-phase cyber severity assessment MCP server.
- Downloads last month
- 16
Source:
Parametrically generated from structured field combinations (50 templates x paraphrase variants)
Generation:
training/scripts/generate_incidents.py
Labels:
4-class (T1-T4)
Balance:
2,000 per class after balancing
Size of downloaded dataset files:
1.66 MB
Size of the auto-converted Parquet files:
316 kB
Number of rows:
8,000