Overview
A system that monitors network traffic or system activities for malicious activity or policy violations.
More in Cybersecurity
Phishing-Resistant Authentication
Identity & AccessAuthentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.
Cybersecurity
Offensive SecurityThe practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.
Firewall
Network SecurityA network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Intrusion Prevention System
Offensive SecurityA network security technology that examines network traffic to detect and prevent vulnerability exploits.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.
MITRE ATT&CK
Offensive SecurityA globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.
Ransomware
Offensive SecurityMalicious software that encrypts a victim's files and demands payment for the decryption key.
Zero-Day Vulnerability
Offensive SecurityA software security flaw unknown to the vendor that can be exploited before a patch is available.