Overview
A code injection technique that exploits vulnerabilities in database-driven applications through malicious SQL statements.
More in Cybersecurity
Sandbox
Offensive SecurityAn isolated testing environment that mimics production settings for safely running untrusted programs or code.
Endpoint Detection and Response
Defensive SecuritySecurity technology that monitors endpoint devices to detect, investigate, and respond to cyber threats.
Identity Threat Detection and Response
Identity & AccessSecurity solutions focused on detecting and responding to identity-based attacks such as credential theft, privilege escalation, and compromised service accounts.
Security Operations Centre
Defensive SecurityA centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.
Software Bill of Materials
Offensive SecurityA comprehensive inventory of all software components, libraries, and dependencies used in an application, enabling vulnerability tracking and supply chain risk management.
Adversary Simulation
Offensive SecurityAdvanced red team exercises that replicate the tactics, techniques, and procedures of specific threat actors to evaluate an organisation's detection and response capabilities.
Zero Trust Architecture
Network SecurityA security model that requires strict identity verification for every person and device accessing resources regardless of location.
Multi-Factor Authentication
Identity & AccessAn authentication method requiring two or more verification factors to gain access to a resource.