Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
167
252
label
stringclasses
4 values
SQL injection against ict service management databases resulting in none data breach across 3 records systems. [SEP] disruption: complete entities: 3 sectors: 3 cascading: none data_compromise: none
T3
API abuse affecting education cloud services causing significant rate limiting and outages. [SEP] disruption: significant entities: 12 sectors: 1 cascading: limited data_compromise: operational
T2
Ransomware-as-a-service targeting education SMEs leading to partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none
T1
Ransomware incident on public administration provider causing sustained disruption to core services reaching 5 entities across 5 sectors. [SEP] disruption: sustained entities: 5 sectors: 5 cascading: limited data_compromise: systemic
T4
Ransomware-as-a-service targeting education SMEs causing partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none
T1
Hardware implant discovered in waste water network equipment with systemic persistent surveillance capability. [SEP] disruption: sustained entities: 8 sectors: 3 cascading: limited data_compromise: systemic
T4
Deepfake-assisted social engineering targeting public administration leadership with none access to 10 strategic services. [SEP] disruption: partial entities: 10 sectors: 1 cascading: none data_compromise: none
T1
Botnet infection across space endpoints with significant service degradation reaching 10 sites. [SEP] disruption: significant entities: 10 sectors: 1 cascading: cross_sector data_compromise: sensitive
T3
Data poisoning attack on digital infrastructure machine learning models with none integrity compromise. [SEP] disruption: partial entities: 3 sectors: 2 cascading: none data_compromise: none
T1
DDoS campaign targeting research infrastructure leading in sustained service degradation for 1 downstream institutions. [SEP] disruption: sustained entities: 1 sectors: 3 cascading: none data_compromise: none
T4
Operational technology network bridge exploit in banking causing partial safety system degradation. [SEP] disruption: partial entities: 12 sectors: 1 cascading: none data_compromise: operational
T2
Zero-day exploitation in research control systems causing partial operational disruption. [SEP] disruption: partial entities: 2 sectors: 3 cascading: none data_compromise: none
T1
Container escape in waste management Kubernetes clusters causing none lateral movement across 3 namespaces. [SEP] disruption: sustained entities: 55 sectors: 3 cascading: none data_compromise: sensitive
T4
Side-channel intrusion on banking cryptographic hardware with systemic key material exposure. [SEP] disruption: significant entities: 3 sectors: 1 cascading: limited data_compromise: systemic
T4
Advanced persistent threat targeting waste management networks with none cascading effects across 1 sectors. [SEP] disruption: significant entities: 12 sectors: 1 cascading: none data_compromise: systemic
T4
Social engineering attack on health help desk leading to systemic data access for 1 accounts. [SEP] disruption: significant entities: 1 sectors: 2 cascading: none data_compromise: systemic
T4
DNS hijacking affecting health domain resolution causing partial service disruption for 8 organizations. [SEP] disruption: partial entities: 8 sectors: 3 cascading: limited data_compromise: none
T2
Vulnerability in public administration VPN gateway exploited for none data exfiltration from 1 endpoints. [SEP] disruption: partial entities: 1 sectors: 2 cascading: none data_compromise: none
T1
Memory corruption exploit in financial market SCADA systems causing significant process control disruption. [SEP] disruption: significant entities: 12 sectors: 2 cascading: uncontrolled data_compromise: none
T2
Container escape in ict service management Kubernetes clusters causing none lateral movement across 2 namespaces. [SEP] disruption: significant entities: 12 sectors: 2 cascading: none data_compromise: none
T2
Privilege escalation in digital providers active directory resulting in none lateral movement across 2 network segments. [SEP] disruption: complete entities: 55 sectors: 2 cascading: none data_compromise: none
T3
OAuth token theft from ict service management identity providers impacting 8 federated services. [SEP] disruption: partial entities: 8 sectors: 1 cascading: none data_compromise: none
T1
Memory corruption exploit in financial market SCADA systems causing significant process control disruption. [SEP] disruption: significant entities: 12 sectors: 2 cascading: uncontrolled data_compromise: none
T2
Configuration error in manufacturing firewall rules exposing none data to unauthorized access. [SEP] disruption: partial entities: 5 sectors: 1 cascading: none data_compromise: none
T1
Log4j-style vulnerability in waste water Java applications reaching 10 instances with significant service impact. [SEP] disruption: significant entities: 10 sectors: 1 cascading: none data_compromise: sensitive
T3
DDoS campaign impacting food production infrastructure ending in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none
T1
Bluetooth vulnerability exploited in ict service management medical devices affecting 25 hospital systems. [SEP] disruption: sustained entities: 25 sectors: 1 cascading: none data_compromise: systemic
T4
SIM swapping attack targeting ict service management executives leading to sensitive two-factor bypass for 2 accounts. [SEP] disruption: sustained entities: 2 sectors: 1 cascading: cross_sector data_compromise: sensitive
T4
Wiper malware launched against ict service management networks causing partial destruction of operational data. [SEP] disruption: partial entities: 1 sectors: 2 cascading: limited data_compromise: none
T2
Memory corruption exploit in financial market SCADA systems resulting in sustained process control degradation. [SEP] disruption: sustained entities: 10 sectors: 1 cascading: none data_compromise: sensitive
T4
Cloud misconfiguration exposing health storage buckets with sensitive data of 2 customers. [SEP] disruption: significant entities: 2 sectors: 2 cascading: uncontrolled data_compromise: sensitive
T3
Third-party cloud provider outage affecting financial market hosted services with sustained interruption across 2 dependent sectors. [SEP] disruption: sustained entities: 5 sectors: 2 cascading: none data_compromise: none
T4
With trojanized packages affecting 10 developers, typosquatting campaign hitting food production supply chain. [SEP] disruption: sustained entities: 10 sectors: 2 cascading: uncontrolled data_compromise: none
T4
OAuth token theft from space identity providers affecting 12 federated services. [SEP] disruption: partial entities: 12 sectors: 2 cascading: limited data_compromise: none
T2
Wiper malware launched against health networks causing sustained destruction of operational data. [SEP] disruption: sustained entities: 25 sectors: 2 cascading: none data_compromise: none
T4
With systemic credential harvesting, watering hole intrusion targeting research personnel websites. [SEP] disruption: complete entities: 12 sectors: 2 cascading: cross_sector data_compromise: systemic
T4
With trojanized packages touching 150 developers, typosquatting campaign affecting financial market supply chain. [SEP] disruption: complete entities: 150 sectors: 2 cascading: limited data_compromise: none
T3
OAuth token theft from energy identity providers affecting 8 federated services. [SEP] disruption: partial entities: 8 sectors: 1 cascading: none data_compromise: none
T1
Container escape in chemicals Kubernetes clusters causing limited lateral movement across 2 namespaces. [SEP] disruption: complete entities: 1 sectors: 2 cascading: limited data_compromise: systemic
T4
Cloud misconfiguration exposing manufacturing storage buckets with sensitive data of 12 customers. [SEP] disruption: complete entities: 12 sectors: 3 cascading: none data_compromise: sensitive
T3
SSH key compromise in chemicals jump servers enabling limited lateral access across 2 network zones. [SEP] disruption: significant entities: 3 sectors: 2 cascading: limited data_compromise: sensitive
T3
Mass scanning and exploitation campaign against research exposed services affecting 2 unpatched systems. [SEP] disruption: partial entities: 2 sectors: 1 cascading: none data_compromise: none
T1
With none credential theft impacting 5 entities, phishing campaign against chemicals operators. [SEP] disruption: complete entities: 5 sectors: 2 cascading: uncontrolled data_compromise: none
T4
WebSocket injection in financial market real-time networks producing significant session disruption for 5 active connections. [SEP] disruption: significant entities: 5 sectors: 2 cascading: limited data_compromise: systemic
T4
DDoS campaign impacting transport infrastructure resulting in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none
T1
Operational technology network bridge exploit in ict service management causing sustained safety system degradation. [SEP] disruption: sustained entities: 5 sectors: 5 cascading: uncontrolled data_compromise: operational
T4
API abuse hitting ict service management cloud services triggering partial rate limiting and outages. [SEP] disruption: partial entities: 8 sectors: 3 cascading: none data_compromise: none
T1
Wiper malware deployed against digital providers systems causing partial destruction of operational data. [SEP] disruption: partial entities: 3 sectors: 2 cascading: cross_sector data_compromise: none
T3
WebSocket injection in drinking water real-time systems leading to partial session outage for 2 active connections. [SEP] disruption: partial entities: 2 sectors: 1 cascading: limited data_compromise: none
T2
Ransomware-as-a-service targeting waste water SMEs causing partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none
T1
With partial service impact, log4j-style vulnerability in manufacturing java applications reaching 10 instances. [SEP] disruption: partial entities: 10 sectors: 2 cascading: cross_sector data_compromise: operational
T3
Memory corruption exploit in waste water SCADA systems triggering significant process control interruption. [SEP] disruption: significant entities: 55 sectors: 1 cascading: cross_sector data_compromise: operational
T3
Man-in-the-middle attack intercepting ict service management communications with systemic data exposure. [SEP] disruption: sustained entities: 5 sectors: 1 cascading: none data_compromise: systemic
T4
Supply chain compromise through digital providers software vendor leading to operational data compromise across 12 client organizations. [SEP] disruption: significant entities: 12 sectors: 1 cascading: none data_compromise: operational
T2
Wiper malware deployed against banking systems causing sustained destruction of operational data. [SEP] disruption: sustained entities: 150 sectors: 3 cascading: uncontrolled data_compromise: operational
T4
Zero-day exploitation in health control systems causing partial operational outage. [SEP] disruption: partial entities: 2 sectors: 2 cascading: none data_compromise: none
T1
Insider threat at waste management facility concluding in none data compromise affecting 10 connected entities. [SEP] disruption: partial entities: 10 sectors: 3 cascading: limited data_compromise: none
T2
Container escape in energy Kubernetes clusters causing uncontrolled lateral movement across 3 namespaces. [SEP] disruption: significant entities: 25 sectors: 3 cascading: uncontrolled data_compromise: operational
T2
SIM swapping attack targeting digital providers executives leading to sensitive two-factor bypass for 3 accounts. [SEP] disruption: significant entities: 3 sectors: 1 cascading: limited data_compromise: sensitive
T3
SSH key compromise in ict service management jump servers enabling cross sector lateral access across 1 network zones. [SEP] disruption: sustained entities: 150 sectors: 1 cascading: cross_sector data_compromise: systemic
T4
Typosquatting campaign targeting research supply chain with trojanized packages reaching 2 developers. [SEP] disruption: complete entities: 2 sectors: 2 cascading: cross_sector data_compromise: systemic
T4
Watering hole attack targeting postal courier personnel websites with sensitive credential harvesting. [SEP] disruption: complete entities: 10 sectors: 1 cascading: limited data_compromise: sensitive
T3
DDoS campaign targeting food production infrastructure resulting in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none
T1
Supply chain compromise through chemicals software vendor leading to systemic data exposure across 55 client operators. [SEP] disruption: complete entities: 55 sectors: 3 cascading: none data_compromise: systemic
T4
SSH key compromise in ict service management jump servers enabling uncontrolled lateral access across 1 network zones. [SEP] disruption: sustained entities: 55 sectors: 1 cascading: uncontrolled data_compromise: operational
T4
Botnet infection across education endpoints with significant service degradation affecting 10 sites. [SEP] disruption: significant entities: 10 sectors: 1 cascading: uncontrolled data_compromise: operational
T2
Mass scanning and exploitation campaign against drinking water exposed services affecting 3 unpatched systems. [SEP] disruption: significant entities: 3 sectors: 1 cascading: none data_compromise: operational
T2
SSH key compromise in space jump servers enabling cross sector lateral access across 1 network zones. [SEP] disruption: complete entities: 2 sectors: 1 cascading: cross_sector data_compromise: operational
T3
Typosquatting campaign targeting digital infrastructure supply chain with trojanized packages affecting 1 developers. [SEP] disruption: significant entities: 1 sectors: 3 cascading: none data_compromise: none
T2
Mass scanning and exploitation campaign against digital providers exposed services affecting 10 unpatched systems. [SEP] disruption: significant entities: 10 sectors: 1 cascading: limited data_compromise: none
T2
SIM swapping breach targeting public administration executives leading to sensitive two-factor bypass for 2 accounts. [SEP] disruption: significant entities: 2 sectors: 5 cascading: cross_sector data_compromise: sensitive
T3
OAuth token theft from manufacturing identity providers affecting 1 federated services. [SEP] disruption: partial entities: 1 sectors: 3 cascading: none data_compromise: none
T1
Ransomware-as-a-service hitting waste water SMEs causing partial disruption across 10 businesses. [SEP] disruption: partial entities: 10 sectors: 2 cascading: none data_compromise: none
T1
Mass scanning and exploitation campaign against education exposed services affecting 3 unpatched infrastructure. [SEP] disruption: sustained entities: 3 sectors: 5 cascading: uncontrolled data_compromise: sensitive
T4
SQL injection against digital providers databases ending in operational data breach across 3 records infrastructure. [SEP] disruption: significant entities: 3 sectors: 2 cascading: uncontrolled data_compromise: operational
T2
DDoS campaign targeting food production infrastructure resulting in partial service degradation for 8 downstream organizations. [SEP] disruption: partial entities: 8 sectors: 2 cascading: none data_compromise: none
T1
OAuth token theft from manufacturing identity providers affecting 1 federated services. [SEP] disruption: partial entities: 1 sectors: 3 cascading: none data_compromise: none
T1
USB-based malware introduced into energy air-gapped systems triggering operational data bridge. [SEP] disruption: significant entities: 12 sectors: 2 cascading: none data_compromise: operational
T2
Vulnerability in postal courier VPN gateway exploited for none data exfiltration from 3 endpoints. [SEP] disruption: complete entities: 3 sectors: 5 cascading: uncontrolled data_compromise: none
T4
Vulnerability in chemicals VPN gateway exploited for operational data exfiltration from 1 endpoints. [SEP] disruption: partial entities: 1 sectors: 1 cascading: limited data_compromise: operational
T2
Malicious update pushed to digital infrastructure monitoring software affecting 12 installations with cross sector cascading impact. [SEP] disruption: significant entities: 12 sectors: 5 cascading: cross_sector data_compromise: systemic
T4
Watering hole attack targeting chemicals personnel websites with none credential harvesting. [SEP] disruption: partial entities: 3 sectors: 3 cascading: none data_compromise: none
T1
Zero-day exploitation in public administration control infrastructure resulting in partial operational degradation. [SEP] disruption: partial entities: 2 sectors: 2 cascading: none data_compromise: none
T1
Certificate authority compromise touching transport trust chains with none cascading trust failures across 1 domains. [SEP] disruption: partial entities: 5 sectors: 1 cascading: none data_compromise: operational
T2
Firmware tampering in health IoT devices resulting in uncontrolled cascading failures in 5 sectors. [SEP] disruption: sustained entities: 12 sectors: 5 cascading: uncontrolled data_compromise: sensitive
T4
Watering hole attack targeting education personnel websites with systemic credential harvesting. [SEP] disruption: sustained entities: 1 sectors: 2 cascading: limited data_compromise: systemic
T4
Configuration error in space firewall rules exposing operational data to unauthorized access. [SEP] disruption: partial entities: 12 sectors: 2 cascading: limited data_compromise: operational
T2
Malicious update pushed to waste water monitoring software affecting 5 installations with cross sector cascading impact. [SEP] disruption: partial entities: 5 sectors: 1 cascading: cross_sector data_compromise: systemic
T4
Operational technology network bridge exploit in manufacturing producing significant safety system degradation. [SEP] disruption: significant entities: 1 sectors: 1 cascading: none data_compromise: none
T2
Data poisoning intrusion on ict service management machine learning models with operational integrity compromise. [SEP] disruption: significant entities: 2 sectors: 1 cascading: none data_compromise: operational
T2
Mass scanning and exploitation campaign against research exposed services affecting 2 unpatched systems. [SEP] disruption: partial entities: 2 sectors: 1 cascading: none data_compromise: none
T1
Power grid cyber-physical attack on transport SCADA leading to partial disruption with none cascading effects. [SEP] disruption: partial entities: 3 sectors: 1 cascading: none data_compromise: none
T1
Zero-day exploitation in health control systems causing partial operational outage. [SEP] disruption: partial entities: 2 sectors: 2 cascading: none data_compromise: none
T1
Business email compromise targeting postal courier financial operations with sensitive transaction data exposure. [SEP] disruption: complete entities: 55 sectors: 2 cascading: cross_sector data_compromise: sensitive
T3
Firmware tampering in food production IoT devices causing none cascading failures in 1 sectors. [SEP] disruption: sustained entities: 5 sectors: 1 cascading: none data_compromise: operational
T4
Zero-day exploitation in research control platforms triggering partial operational impairment. [SEP] disruption: partial entities: 2 sectors: 3 cascading: none data_compromise: none
T1
Privilege escalation in waste water active directory causing limited lateral movement across 1 network segments. [SEP] disruption: significant entities: 150 sectors: 1 cascading: limited data_compromise: operational
T3
USB-based malware introduced into food production air-gapped systems leading to operational data bridge. [SEP] disruption: significant entities: 55 sectors: 3 cascading: cross_sector data_compromise: operational
T3
With sensitive data of 12 customers, cloud misconfiguration exposing energy storage buckets. [SEP] disruption: significant entities: 12 sectors: 2 cascading: uncontrolled data_compromise: sensitive
T3
DNS hijacking affecting education domain resolution causing partial service disruption for 12 organizations. [SEP] disruption: partial entities: 12 sectors: 2 cascading: cross_sector data_compromise: none
T3
End of preview. Expand in Data Studio

CyberScale Technical Severity Training Data

Training dataset for the CyberScale incident technical severity classifier (Phase 3 T-model). Contains 8,000 parametric incident scenarios with deterministic T1-T4 labels.

Schema

Column Type Description
text string Formatted input: <description> [SEP] disruption: <level> entities: <N> sectors: <N> cascading: <level> data_compromise: <level>
label string Technical severity level (T1/T2/T3/T4)

Class Distribution

Label Count
T1 2,000
T2 2,000
T3 2,000
T4 2,000

Citation

Part of the CyberScale project — multi-phase cyber severity assessment MCP server.

Downloads last month
16