Overview
Malicious software designed to disrupt, damage, or gain unauthorised access to computer systems.
More in Cybersecurity
Honeypot
Defensive SecurityA decoy system designed to attract attackers and study their methods while protecting real systems.
Cloud Security Posture Management
Security GovernanceAutomated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
ISO 27001
Security GovernanceAn international standard for information security management systems specifying requirements for establishing and maintaining security.
Buffer Overflow
Offensive SecurityA programming error where data written to a buffer exceeds its capacity, potentially allowing code execution.
Supply Chain Attack
Offensive SecurityA cyberattack targeting the less-secure elements of a supply chain to compromise a primary target.
Intrusion Detection System
Defensive SecurityA system that monitors network traffic or system activities for malicious activity or policy violations.
Extended Detection and Response
Offensive SecurityA unified security platform that integrates multiple security tools and data sources for comprehensive threat detection.
Phishing-Resistant Authentication
Identity & AccessAuthentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.