File size: 3,254 Bytes
449eb6c
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
{
  "2FA": 30646,
  "Ad Fraud": 30568,
  "Advanced Persistent Threat": 30574,
  "Advanced Threat Protection": 30575,
  "Adware": 30576,
  "Anti-Botnet": 30577,
  "Anti-Malware": 30578,
  "Anti-Phishing": 30579,
  "Anti-Virus": 30580,
  "Attack Vector": 30581,
  "Authentication": 30582,
  "BYOC": 30588,
  "BYOD": 30589,
  "BYOL": 30590,
  "Backdoor": 30537,
  "Banker Trojan": 30583,
  "Black Hat": 30652,
  "Blacklist": 30584,
  "Bot": 30585,
  "Botnet": 30528,
  "Browser Hijacking": 30563,
  "Brute Force Attack": 30539,
  "Buffer Overflow": 30545,
  "Business Continuity Plan": 30586,
  "Business Disruption": 30587,
  "CAPTCHA": 30591,
  "COTS": 30595,
  "Click Fraud": 30567,
  "Click Jacking": 30546,
  "Clickjacking": 30592,
  "Clientless": 30593,
  "Code Injection": 30594,
  "Credential Harvesting": 30564,
  "Credential Stuffing": 30538,
  "Critical Infrastructure": 30596,
  "Cross-Site Scripting": 30531,
  "Cryptojacking": 30540,
  "Cyber Espionage": 30548,
  "Cyber Extortion": 30557,
  "Cyber Stalking": 30555,
  "Cyberbullying": 30597,
  "Cybercrime": 30655,
  "Cybersecurity": 30598,
  "DDoS": 30529,
  "DLP": 30601,
  "DNS": 30607,
  "DNS Hijacking": 30570,
  "DNS Spoofing": 30553,
  "Dark Web": 30599,
  "Data Breach": 30541,
  "Data Integrity": 30600,
  "Data Theft": 30602,
  "Decryption": 30603,
  "Detection and Response": 30604,
  "Digital Forensics": 30605,
  "Digital Transformation": 30606,
  "Drive-By Download": 30559,
  "Drive-By Download Attack": 30608,
  "Eavesdropping": 30556,
  "Encryption": 30609,
  "Endpoint Protection": 30610,
  "Exploit": 30611,
  "FIDO": 30612,
  "File Injection": 30565,
  "Fileless Malware": 30560,
  "Firewall": 30613,
  "Formgrabbing": 30569,
  "Formjacking": 30547,
  "Greylist": 30614,
  "Hacker": 30615,
  "Honeypot": 30616,
  "IAM": 30617,
  "IOC": 30618,
  "IPS": 30621,
  "Identity Theft": 30542,
  "In-line Network Device": 30619,
  "Insider Threat": 30620,
  "IoT": 30622,
  "Keylogger": 30535,
  "Logic Bomb": 30561,
  "Macroviruses": 30571,
  "Malvertising": 30566,
  "Malware": 30525,
  "Man-In-The-Middle Attack": 30532,
  "Man-in-the-Middle": 30623,
  "PII": 30627,
  "Packet Sniffing": 30572,
  "Parental Controls": 30624,
  "Patch": 30625,
  "Pen Testing": 30626,
  "Pharming": 30562,
  "Phishing": 30524,
  "Process Hollowing": 30628,
  "RDP": 30629,
  "Ram Scraping": 30573,
  "Ransomware": 30522,
  "Risktool": 30630,
  "Rootkit": 30536,
  "SECaaS": 30633,
  "SIEM": 30638,
  "SIM Swapping": 30639,
  "SOAR": 30640,
  "SOC": 30636,
  "SQL Injection": 30530,
  "SSL": 30634,
  "Sandbox": 30631,
  "Scareware": 30632,
  "Security Incident Response": 30635,
  "Security Perimeter": 30637,
  "Session Hijacking": 30554,
  "Smishing": 30551,
  "Sniffing": 30544,
  "Social Engineering": 30533,
  "Spam": 30641,
  "Spear Phishing": 30642,
  "Spoofing": 30543,
  "Spyware": 30526,
  "Threat Assessment": 30643,
  "Threat Hunting": 30644,
  "Threat Intelligence": 30645,
  "Trojan": 30527,
  "Typosquatting": 30558,
  "VPN": 30648,
  "Virus": 30647,
  "Vishing": 30550,
  "Vulnerability": 30649,
  "WAF": 30650,
  "Watering Hole Attack": 30552,
  "Whaling": 30549,
  "White Hat": 30651,
  "Worm": 30653,
  "Zero-Day Exploit": 30534,
  "Zero-day Exploit": 30654,
  "url": 30523
}