Exfiltration
The unauthorized transfer of information from a system.
A system that simulates the decision-making of a human expert by applying factual or heuristic rules generated by a human subject matter expert.
(Verb) To attack a weakness in an IT system to accomplish some malicious action. (Noun) Generally refers to a specific method/procedure/software used to exploit a known vulnerability.
An operation designed to deflect attribution to an uninvolved party. A cyber operation would be a false flag if the threat actor behind it took steps to impersonate or use...
An attack using a network designed to obfuscate the location of a cyber adversary’s command and control server by manipulating the domain name system (DNS) in a way that rotates...
A kind of malware used in low-observable-characteristics attacks. Because it abuses legitimate programs and does not rely on storing files on a hard drive (instead going directly to memory) fileless...