glossary

glossary

What is Typo-squatting?

Typo-squatting, also known as URL hijacking and fake URLs, is a type of attack that takes advantage of typos and other e...
glossary

What is a webshell?

A webshell is a program that executes arbitrary commands on a web server to upload, delete, download files, execute syst...
glossary

What is command injection?

Command injection is an attack aimed at executing arbitrary commands on a host operating system via a vulnerable applica...
glossary

What is a supply chain attack?

A supply chain attack is a cyber attack aimed at targeting an insecure element in the supply chain against the intended ...
glossary

What is Exploit?

Exploit is a software, data, or series of commands that uses a bug or vulnerability to cause computer software or hardwa...
glossary

What is a downloader/dropper? What is the difference?

A downloader is a program that downloads and installs/runs one or more malware from the Internet Downloaders are similar...
glossary

What is DLL hijacking (DLL Hijacking)?

It is commonly referred to as "DLL hijacking (DLL hijacking)", "DLL spoofing", "DLL preloading", or "binary planting". A...
glossary

What is ICMP?

ICMP (Internet Control Message Protocol) is one of the supporting protocols of the Internet Protocol Suite ICMP is used ...
glossary

What is a sandbox?

A sandbox in computer security is a security mechanism for isolating a running program. Usually used to prevent system f...
glossary

What is ransomware?

Ransomware is a type of cryptoviral malware that threatens to release the victim's data unless a ransom is paid, or perm...