Malicious software that encrypts files and demands payment for decryption.
A simulated cyberattack conducted by security professionals to assess and improve defense measures.
Analyzing software or hardware to understand its design, functionality, or vulnerabilities.
Malicious software that hides its presence and allows unauthorized control of a system.
A vulnerability that allows attackers to run malicious code on a remote system.
Authentication method that adjusts security measures based on the perceived risk of the access attempt.
Protecting RFID systems from unauthorized access, cloning, or interference.
Modifying the Windows registry to disrupt system functionality or enable malicious actions.
An unauthorized access point set up to compromise a network and steal data.
A buffer overflow attack that redirects execution to a system library, typically libc, to execute malicious code.
A DDoS attack where the attacker exploits publicly available services to amplify the attack traffic.
Continuously monitoring systems to identify and respond to threats in real-time.
Malicious software that collects sensitive data, such as credit card information, from a system's memory.
Security technology that detects and prevents threats within running applications.
A form of attack where valid data transmission is intercepted and replayed to gain unauthorized access.
Software that behaves maliciously, often appearing legitimate but performing harmful actions.
The practice of designing systems to recover quickly from failures and withstand cyber threats.
A method that evaluates the trustworthiness of entities (such as websites or users) based on reputation scores.
A method of bypassing security by manipulating DNS responses to associate a victim’s browser with a malicious server.
A precomputed table used to reverse cryptographic hash functions and crack password hashes.