glossary What is Typo-squatting? Typo-squatting, also known as URL hijacking and fake URLs, is a type of attack that takes advantage of typos and other e... 2021.12.11 glossary
glossary What is a webshell? A webshell is a program that executes arbitrary commands on a web server to upload, delete, download files, execute syst... 2021.12.11 glossary
glossary What is command injection? Command injection is an attack aimed at executing arbitrary commands on a host operating system via a vulnerable applica... 2021.12.11 glossary
glossary What is a supply chain attack? A supply chain attack is a cyber attack aimed at targeting an insecure element in the supply chain against the intended ... 2021.12.11 glossary
glossary What is Exploit? Exploit is a software, data, or series of commands that uses a bug or vulnerability to cause computer software or hardwa... 2021.12.11 glossary
glossary What is a downloader/dropper? What is the difference? A downloader is a program that downloads and installs/runs one or more malware from the Internet Downloaders are similar... 2021.12.11 glossary
glossary What is DLL hijacking (DLL Hijacking)? It is commonly referred to as "DLL hijacking (DLL hijacking)", "DLL spoofing", "DLL preloading", or "binary planting". A... 2021.12.11 glossary
glossary What is ICMP? ICMP (Internet Control Message Protocol) is one of the supporting protocols of the Internet Protocol Suite ICMP is used ... 2021.12.11 glossary
glossary What is a sandbox? A sandbox in computer security is a security mechanism for isolating a running program. Usually used to prevent system f... 2021.12.11 glossary
glossary What is ransomware? Ransomware is a type of cryptoviral malware that threatens to release the victim's data unless a ransom is paid, or perm... 2021.12.11 glossary