Malvertising
Online advertising used to spread malware.
Active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them. The victims thus believe they are communicating directly with one another, but in...
Information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify targets and events, and derived from specialized, technically derived measurements of...
An open-source tool for developing and executing exploit code against a remote target machine.
The practice of sending a high volume of spamming multifactor authentication (MFA) login attempts to an account until the account’s owner accepts the MFA prompt out of desperation, wishing to...
A zero-trust security technique that isolates application workloads from one another in a way that allows each to be protected individually.
Reducing risks or effects. In the context of cyber security, reducing the risk or effect of a cyber attack.