Overview
A targeted phishing attack directed at specific individuals or organisations using personalised deceptive content.
Cross-References(1)
More in Cybersecurity
Deception Technology
Identity & AccessSecurity solutions that deploy decoy assets such as fake servers, credentials, and data to detect, misdirect, and analyse attackers who have breached perimeter defences.
Cloud Security Posture Management
Security GovernanceAutomated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
Security Audit
Security GovernanceA systematic evaluation of an organisation's information system security by measuring compliance with established criteria.
Bug Bounty
Offensive SecurityA programme where organisations pay individuals for discovering and reporting software vulnerabilities.
SQL Injection
Offensive SecurityA code injection technique that exploits vulnerabilities in database-driven applications through malicious SQL statements.
Security by Design
Security GovernanceAn approach that integrates security considerations into every stage of the software development lifecycle.
NIST Cybersecurity Framework
Security GovernanceA set of voluntary guidelines for managing and reducing cybersecurity risk developed by the US National Institute of Standards.
Certificate Authority
Network SecurityAn entity that issues digital certificates, verifying the identity of organisations and encrypting communications.