vulnerability

2024-08-19

A vulnerability is a weakness that can be exploited.

Read More

/dev/tcp

2024-08-18

The bash shell provides a special file /dev/tcp that allows a user to establish network connections in a similar manner to Netcat. ...

Read More

anti-virus

2024-08-18

Antivirus (AV) software is a computer program intended to detect, prevent, and remove malware.

Read More

command and control

2024-08-18

In a malware context. Command and Control (C2) is a collection of methods and software used to communicate with and control infected hosts.

Many C2 ...

Read More

cron

2024-08-18

Cron is a task scheduling service commonly found on Unix-like operating systems such as Linux, macOS, BSD, Solaris, etc.

Read More

cybersecurity

2024-08-18

Cybersecurity is the art of protecting cyber assets from unauthorized use and the practice of ensuring the CIA triad of information. ...

Read More

MITRE ATT&CK

2024-08-18

MITRE ATT&CK is a knowledge base of adversary TTPs based on real-world observations and events.

https://attack.mitre.org/

Read More

Remote Access Trojan

2024-08-18

A Remote Access Trojan (RAT) is malware that grants an attacker the ability to remotely control a computer.

Read More

Secure Shell (SSH)

2024-08-18

Secure Shell (SSH) is a network protocol for operating networked services securely over an unsecured network. It is typically used for remote ...

Read More

securelist-penquins_moonlit_maze2017

2024-08-18

Penquin’s Moonlit Maze

by Costin Raiu, Daniel Moore, Juan Andres Guerrero-Saade, and Thomas Rid

2017-04-03 ...

Read More