Cyberattack

A C D E F H J K L M P R S T V W X Y Z

Account Takeover

Account takeover (ATO) refers to a type of cyber attack where unauthorized individuals gain access to a user’s online account(s) by stealing their login credentials, such as usernames and passwords. Once attackers have gained control of an account, they can perform various malicious activities, such as: Identity Theft: Attackers may use the compromised account to […]

Account Takeover Read More »

Advanced Persistent Threat

An Advanced Persistent Threat (APT) is a sophisticated and targeted cyberattack carried out by highly skilled threat actors, often with significant resources and advanced capabilities, who persistently and stealthily infiltrate and compromise targeted organizations or networks over an extended period. APT attacks are characterized by their strategic objectives, advanced techniques, and persistent nature, often aimed

Advanced Persistent Threat Read More »

Attack Surface Analysis

Attack Surface Analysis refers to the process of identifying and evaluating the various points of potential vulnerability in a system or organization that could be exploited by attackers. An attack surface encompasses all the entry points and avenues through which an attacker could gain unauthorized access, cause disruption, or compromise security. Analyzing the attack surface

Attack Surface Analysis Read More »

Attack Vector

An attack vector refers to the pathway or method that a cyber attacker uses to exploit vulnerabilities, gain unauthorized access, or compromise a target system, network, or application. Attack vectors represent the various entry points, techniques, or mechanisms that attackers leverage to launch cyber attacks and achieve their malicious objectives. Attack vectors can encompass a

Attack Vector Read More »

Certificate Pinning

Certificate pinning, also known as SSL pinning or public key pinning, is a security mechanism used in web and mobile applications to prevent man-in-the-middle (MITM) attacks by ensuring that only specific digital certificates or public keys are trusted when establishing secure connections over HTTPS. Traditionally, when a client (such as a web browser or a

Certificate Pinning Read More »

Clickjacking

Clickjacking, also known as UI redressing or user interface (UI) overlay attacks, is a malicious technique used to trick users into clicking on unintended or disguised elements on a webpage or application interface without their knowledge or consent. Clickjacking attacks involve embedding invisible or disguised elements, such as buttons, links, or interactive content, within a

Clickjacking Read More »

Code Injection

Code injection is a type of security vulnerability and attack technique that involves inserting or injecting malicious code into a software application or system to manipulate its behavior, compromise its security, or exploit vulnerabilities. Code injection attacks typically target web applications, server-side scripts, database queries, or other executable code running in a runtime environment where

Code Injection Read More »

Command and Control

Command and Control (C2), also known as C&C or C2C, refers to a centralized system or infrastructure used by attackers or malicious actors to communicate with and control compromised devices, systems, or botnets. The Command and Control infrastructure enables attackers to remotely manage and coordinate the activities of compromised endpoints, such as computers, servers, IoT

Command and Control Read More »

Cross-Site Scripting

Cross-Site Scripting (XSS) is a type of security vulnerability commonly found in web applications that allows attackers to inject malicious scripts into web pages viewed by other users. XSS attacks occur when an application accepts and renders untrusted user input without properly validating or sanitizing it, allowing attackers to execute arbitrary code within the context

Cross-Site Scripting Read More »

Data Exfiltration

Data exfiltration, also known as data extrusion or data exfiltration, refers to the unauthorized transfer or theft of sensitive or confidential data from a secure environment to an external location or attacker-controlled infrastructure. This process involves extracting data from an organization’s network, systems, or storage repositories without authorization, often with the intent of exploiting or

Data Exfiltration Read More »

Scroll to Top