vulnerability
2024-08-19
A vulnerability is a weakness that can be exploited.
Read More
/dev/tcp
2024-08-18
The bash shell provides a special file /dev/tcp that allows a user to establish network connections in a similar manner to Netcat. ...
Read More
anti-virus
2024-08-18
Antivirus (AV) software is a computer program intended to detect, prevent, and remove malware.
Read More
command and control
2024-08-18
In a malware context. Command and Control (C2) is a collection of methods and software used to communicate with and control infected hosts.
Many C2 ...
Read More
cron
2024-08-18
Cron is a task scheduling service commonly found on Unix-like operating systems such as Linux, macOS, BSD, Solaris, etc.
Read More
cybersecurity
2024-08-18
Cybersecurity is the art of protecting cyber assets from unauthorized use and the practice of ensuring the CIA triad of information. ...
Read More
MITRE ATT&CK
2024-08-18
MITRE ATT&CK is a knowledge base of adversary TTPs based on real-world observations and events.
Read More
Remote Access Trojan
2024-08-18
A Remote Access Trojan (RAT) is malware that grants an attacker the ability to remotely control a computer.
Read More
Secure Shell (SSH)
2024-08-18
Secure Shell (SSH) is a network protocol for operating networked services securely over an unsecured network. It is typically used for remote ...
Read More
securelist-penquins_moonlit_maze2017
2024-08-18
Penquin’s Moonlit Maze
by Costin Raiu, Daniel Moore, Juan Andres Guerrero-Saade, and Thomas Rid
2017-04-03 ...
Read More