Overview
The specific path, method, or scenario used by an attacker to gain unauthorised access to a system.
More in Cybersecurity
AI Security
Offensive SecurityThe discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.
Supply Chain Attack
Offensive SecurityA cyberattack targeting the less-secure elements of a supply chain to compromise a primary target.
Security by Design
Security GovernanceAn approach that integrates security considerations into every stage of the software development lifecycle.
Cloud-Native Application Protection
Offensive SecurityAn integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.
Encryption
Data ProtectionThe process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.
SQL Injection
Offensive SecurityA code injection technique that exploits vulnerabilities in database-driven applications through malicious SQL statements.
Intrusion Detection System
Defensive SecurityA system that monitors network traffic or system activities for malicious activity or policy violations.
Threat Hunting
Defensive SecurityThe proactive search for cyber threats within an organisation's environment that have evaded automated detection, using hypotheses, threat intelligence, and advanced analytics.