Overview
A group of security professionals who simulate real-world attacks to test an organisation's defensive capabilities.
More in Cybersecurity
Attack Surface
Offensive SecurityThe total number of points where an unauthorised user can try to enter or extract data from a system.
Attack Surface Management
Offensive SecurityThe continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.
Cyber Threat Intelligence
Offensive SecurityEvidence-based knowledge about adversary capabilities, infrastructure, motives, and tactics that informs security decisions and enables proactive defence against cyber attacks.
Threat Hunting
Defensive SecurityThe proactive search for cyber threats within an organisation's environment that have evaded automated detection, using hypotheses, threat intelligence, and advanced analytics.
Security Orchestration Automation and Response
Defensive SecurityTechnology that automates security operations by orchestrating tools and processes for incident response.
Buffer Overflow
Offensive SecurityA programming error where data written to a buffer exceeds its capacity, potentially allowing code execution.
Honeypot
Defensive SecurityA decoy system designed to attract attackers and study their methods while protecting real systems.
Runtime Application Self-Protection
Offensive SecuritySecurity technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.