access.log
0001-01-01
access.log is the file name commonly associated with web server request logging.
Read More
Active Directory
0001-01-01
Active Directory is a Microsoft directory service used for managing users, devices, and other networked resources in a Windows domain network.
Read More
active reconnaissance
0001-01-01
In cybersecurity contexts, active reconnaissance refers to directly interacting with a target to gather information. For example: port scanning or ...
Read More
activity cluster
0001-01-01
An activity cluster is a group of related activities specifically related to a threat actor or group.
Read More
actually review security alerts
0001-01-01
Often, organizations detect malicious activity, but fail to act on the detection.
An example scenario is that an attacker compromises an endpoint with ...
Read More
ad blocker
0001-01-01
ad blockers refer to technology used to eliminate or limit advertisements displayed on internet-connected devices.
Read More
ADCC
0001-01-01
The Abu Dhabi Combat Club (ADCC) is a submission grappling world championship that occurs every two years.
Read More
Adel Ka
0001-01-01
Adel Ka is a hacker and cybersecurity professional, with focused work involving network security.
Adel previously worked at Google and has presented ...
Read More
Administrator user
0001-01-01
The Administrator user is commonly used on Windows as a user account that has full permissions to make changes of the computer’s configuration ...
Read More
Advanced Encryption Standard
0001-01-01 cryptography
Advanced Encryption Standard (AES)
AES is a symmetric-key algorithm; the same key is used for both encryption and decryption.
There are several types ...
Read More