File size: 3,254 Bytes
449eb6c | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 | {
"2FA": 30646,
"Ad Fraud": 30568,
"Advanced Persistent Threat": 30574,
"Advanced Threat Protection": 30575,
"Adware": 30576,
"Anti-Botnet": 30577,
"Anti-Malware": 30578,
"Anti-Phishing": 30579,
"Anti-Virus": 30580,
"Attack Vector": 30581,
"Authentication": 30582,
"BYOC": 30588,
"BYOD": 30589,
"BYOL": 30590,
"Backdoor": 30537,
"Banker Trojan": 30583,
"Black Hat": 30652,
"Blacklist": 30584,
"Bot": 30585,
"Botnet": 30528,
"Browser Hijacking": 30563,
"Brute Force Attack": 30539,
"Buffer Overflow": 30545,
"Business Continuity Plan": 30586,
"Business Disruption": 30587,
"CAPTCHA": 30591,
"COTS": 30595,
"Click Fraud": 30567,
"Click Jacking": 30546,
"Clickjacking": 30592,
"Clientless": 30593,
"Code Injection": 30594,
"Credential Harvesting": 30564,
"Credential Stuffing": 30538,
"Critical Infrastructure": 30596,
"Cross-Site Scripting": 30531,
"Cryptojacking": 30540,
"Cyber Espionage": 30548,
"Cyber Extortion": 30557,
"Cyber Stalking": 30555,
"Cyberbullying": 30597,
"Cybercrime": 30655,
"Cybersecurity": 30598,
"DDoS": 30529,
"DLP": 30601,
"DNS": 30607,
"DNS Hijacking": 30570,
"DNS Spoofing": 30553,
"Dark Web": 30599,
"Data Breach": 30541,
"Data Integrity": 30600,
"Data Theft": 30602,
"Decryption": 30603,
"Detection and Response": 30604,
"Digital Forensics": 30605,
"Digital Transformation": 30606,
"Drive-By Download": 30559,
"Drive-By Download Attack": 30608,
"Eavesdropping": 30556,
"Encryption": 30609,
"Endpoint Protection": 30610,
"Exploit": 30611,
"FIDO": 30612,
"File Injection": 30565,
"Fileless Malware": 30560,
"Firewall": 30613,
"Formgrabbing": 30569,
"Formjacking": 30547,
"Greylist": 30614,
"Hacker": 30615,
"Honeypot": 30616,
"IAM": 30617,
"IOC": 30618,
"IPS": 30621,
"Identity Theft": 30542,
"In-line Network Device": 30619,
"Insider Threat": 30620,
"IoT": 30622,
"Keylogger": 30535,
"Logic Bomb": 30561,
"Macroviruses": 30571,
"Malvertising": 30566,
"Malware": 30525,
"Man-In-The-Middle Attack": 30532,
"Man-in-the-Middle": 30623,
"PII": 30627,
"Packet Sniffing": 30572,
"Parental Controls": 30624,
"Patch": 30625,
"Pen Testing": 30626,
"Pharming": 30562,
"Phishing": 30524,
"Process Hollowing": 30628,
"RDP": 30629,
"Ram Scraping": 30573,
"Ransomware": 30522,
"Risktool": 30630,
"Rootkit": 30536,
"SECaaS": 30633,
"SIEM": 30638,
"SIM Swapping": 30639,
"SOAR": 30640,
"SOC": 30636,
"SQL Injection": 30530,
"SSL": 30634,
"Sandbox": 30631,
"Scareware": 30632,
"Security Incident Response": 30635,
"Security Perimeter": 30637,
"Session Hijacking": 30554,
"Smishing": 30551,
"Sniffing": 30544,
"Social Engineering": 30533,
"Spam": 30641,
"Spear Phishing": 30642,
"Spoofing": 30543,
"Spyware": 30526,
"Threat Assessment": 30643,
"Threat Hunting": 30644,
"Threat Intelligence": 30645,
"Trojan": 30527,
"Typosquatting": 30558,
"VPN": 30648,
"Virus": 30647,
"Vishing": 30550,
"Vulnerability": 30649,
"WAF": 30650,
"Watering Hole Attack": 30552,
"Whaling": 30549,
"White Hat": 30651,
"Worm": 30653,
"Zero-Day Exploit": 30534,
"Zero-day Exploit": 30654,
"url": 30523
}
|