imphash

0001-01-01

Import Hash (ImpHash) is a hash over the imported functions in a PE file commonly used for malware identification purposes.

Read More

implant

0001-01-01

An implant in a cybersecurity context is a stealthy, persistent piece of malware that aims to maintain unauthorized access for an attacker.

Read More

Import Address Table

0001-01-01 pe

The Import Address Table is a data structure within a PE file that contains information about the addresses of functions imported from other PE files. ...

Read More

incident responder

0001-01-01

An incident responder is one who is engaged in incident response.

Read More

incident response

0001-01-01

Incident Response is a strategic approach to detecting and managing cyberattacks in a manner that prioritizes minimizing damage, decreases recovery ...

Read More

incident response plan

0001-01-01

An incident reponse plan is a formalized set of instructions providing guidance for an organization to detect, respond to, and recover from ...

Read More

Indicators of Compromise (IoC)

0001-01-01

An Indicator of Compromise (IoC) is a piece of digital forensics that suggests that a computer resource has been breached.

IoC monitoring is a ...

Read More

industrial espionage

0001-01-01

industrial espionage (corporate espionage) is the act of illegally gathering confidential information or intelligence from a competitor. This isoften ...

Read More

inferior position

0001-01-01

In BJJ, inferior positions refer to positions where the practitioner is being pinned or held in a disadvantageous manner, allowing their attacker more ...

Read More

infinite loop

0001-01-01

In computer programming, an infinite loop (endless loop) is a sequence of instructions that will continue repeatedly, forever or until the program is ...

Read More