Overview
A decoy system designed to attract attackers and study their methods while protecting real systems.
More in Cybersecurity
Blue Team
Offensive SecurityA group of security professionals who defend against both real attackers and simulated attacks from red teams.
Attack Surface
Offensive SecurityThe total number of points where an unauthorised user can try to enter or extract data from a system.
Penetration Testing
Offensive SecurityA simulated cyberattack against a system to evaluate the security of its defences and identify exploitable vulnerabilities.
Intrusion Prevention System
Offensive SecurityA network security technology that examines network traffic to detect and prevent vulnerability exploits.
Supply Chain Attack
Offensive SecurityA cyberattack targeting the less-secure elements of a supply chain to compromise a primary target.
Vulnerability Assessment
Offensive SecurityThe process of identifying, quantifying, and prioritising security vulnerabilities in systems and applications.
Malware
Offensive SecurityMalicious software designed to disrupt, damage, or gain unauthorised access to computer systems.
MITRE ATT&CK
Offensive SecurityA globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.