A hacker who engages in illegal or unethical cyber activities, such as data breaches or fraud.
A vulnerability where excess data overwrites adjacent memory, potentially leading to system crashes or exploits.
A hacking method that systematically attempts multiple password combinations to gain unauthorized access.
Techniques and measures to protect blockchain networks from fraud, attacks, and vulnerabilities.
Processes for creating and restoring copies of data to prevent loss due to cyber incidents.
A program where ethical hackers are rewarded for identifying and reporting security vulnerabilities.
A cybersecurity team responsible for defending an organization's network and detecting threats.
A network of compromised devices controlled by an attacker to carry out large-scale cyberattacks.
A type of fraud where attackers impersonate business executives to manipulate employees or clients.
A technique used to identify and track users based on unique browser settings and behaviors.
An attack where hackers manipulate Border Gateway Protocol (BGP) routes to redirect internet traffic.
Security measures designed to protect a system’s bootloader from unauthorized modifications.
Techniques used to exploit vulnerabilities in compiled software binaries.
A security approach that detects malware based on behavioral analysis rather than signatures.
A highly secured server designed to withstand attacks and serve as a gateway to a private network.
Techniques to protect a system’s Basic Input/Output System (BIOS) from tampering or malware.
Security practices to protect Bluetooth devices from eavesdropping, hijacking, or unauthorized access.
A type of malware designed to steal banking credentials and financial information.
A method used by malware to communicate with an attacker-controlled server for command execution.
A popular cybersecurity tool used for web application security testing and penetration testing.