Category: Network Security

Vulnerability

A Vulnerability is a weakness or flaw in a system, network, software, or process that could be exploited by an ...

Vulnerability Assessment

The process of identifying and evaluating potential security weaknesses, vulnerabilities, or exposures within a ...

Vulnerability Disclosure

The responsible reporting and disclosure of discovered vulnerabilities to relevant organizations or security teams ...

Vulnerability Scanning

Vulnerability Scanning is the automated process of identifying and detecting potential vulnerabilities in a system ...

Web Application Firewall (WAF)

Web Application Firewalls (WAFs) are cybersecurity tools used for filtering, monitoring, and blocking data packets ...

Web Attack Surface

The collection of potential entry points and vulnerabilities in a web application that may be exploited by ...

Web Filtering

The process of controlling and restricting access to web content based on defined policies, allowing organizations ...

Web Proxy

An intermediary server that acts as a gateway between users and the internet, intercepting and forwarding web ...

Wizard Spider

Overview: Wizard Spider conducts financially-motivated cybercrime. Closely linked with Exotic Lily, who ...

Zero Trust

Zero Trust is a security architecture, framework and mindset, sometimes known as perimeterless security, and ...

Zero Trust Architecture

Zero Trust Architecture (ZTA) is a cybersecurity framework that assumes no implicit trust and requires continuous ...

Zero-day Exploit

An exploit that takes advantage of a vulnerability unknown to the software vendor or the general public, leaving ...