The practice of securing communication and data using encryption and decryption techniques.
Information about cyber threats used to prevent or mitigate cyberattacks.
A technique used by cybercriminals to remotely control compromised systems.
Measures to protect cloud computing environments from cyber threats and data breaches.
A framework outlining the stages of a cyberattack, from reconnaissance to data exfiltration.
A web security vulnerability where attackers inject malicious scripts into web applications.
A structured approach to managing cybersecurity risks and improving security posture.
An entity that issues digital certificates to authenticate users and websites.
A publicly known list of security vulnerabilities and exposures.
Techniques to secure containerized applications from threats and vulnerabilities.
An attack where attackers use leaked credentials to gain unauthorized access to accounts.
An attack where users are tricked into clicking on malicious elements hidden on a webpage.
Ensuring an organization adheres to security policies, regulations, and standards.
An attack that extracts sensitive data from a system's RAM after a reboot.
Techniques that use deceptive methods to mislead attackers and protect systems.
A commercial penetration testing tool often misused by cybercriminals for post-exploitation activities.
The collection of usernames, passwords, and other credentials through phishing or malware.
Protecting essential systems like power grids and water supply from cyber threats.
A communication channel used by attackers to bypass security controls and transmit data.
An attack where malicious code is inserted into a vulnerable application for execution.