Overview
An attack where the attacker secretly relays and potentially alters communication between two parties.
More in Cybersecurity
AI Security
Offensive SecurityThe discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.
Identity Threat Detection and Response
Identity & AccessSecurity solutions focused on detecting and responding to identity-based attacks such as credential theft, privilege escalation, and compromised service accounts.
Secure Access Service Edge
Network SecurityA cloud architecture that converges networking and security services including SD-WAN, firewall, and zero trust access into a unified cloud-delivered platform.
Cyber Kill Chain
Offensive SecurityA model describing the stages of a cyberattack from reconnaissance through data exfiltration.
Deception Technology
Identity & AccessSecurity solutions that deploy decoy assets such as fake servers, credentials, and data to detect, misdirect, and analyse attackers who have breached perimeter defences.
Zero-Day Vulnerability
Offensive SecurityA software security flaw unknown to the vendor that can be exploited before a patch is available.
Digital Forensics
Defensive SecurityThe process of collecting, preserving, and analysing electronic evidence for investigating security incidents.
Security Orchestration, Automation and Response
Defensive SecurityA technology stack that integrates security tools and automates incident response workflows, enabling faster triage, investigation, and remediation of security alerts.