| { | |
| "2FA": 30646, | |
| "Ad Fraud": 30568, | |
| "Advanced Persistent Threat": 30574, | |
| "Advanced Threat Protection": 30575, | |
| "Adware": 30576, | |
| "Anti-Botnet": 30577, | |
| "Anti-Malware": 30578, | |
| "Anti-Phishing": 30579, | |
| "Anti-Virus": 30580, | |
| "Attack Vector": 30581, | |
| "Authentication": 30582, | |
| "BYOC": 30588, | |
| "BYOD": 30589, | |
| "BYOL": 30590, | |
| "Backdoor": 30537, | |
| "Banker Trojan": 30583, | |
| "Black Hat": 30652, | |
| "Blacklist": 30584, | |
| "Bot": 30585, | |
| "Botnet": 30528, | |
| "Browser Hijacking": 30563, | |
| "Brute Force Attack": 30539, | |
| "Buffer Overflow": 30545, | |
| "Business Continuity Plan": 30586, | |
| "Business Disruption": 30587, | |
| "CAPTCHA": 30591, | |
| "COTS": 30595, | |
| "Click Fraud": 30567, | |
| "Click Jacking": 30546, | |
| "Clickjacking": 30592, | |
| "Clientless": 30593, | |
| "Code Injection": 30594, | |
| "Credential Harvesting": 30564, | |
| "Credential Stuffing": 30538, | |
| "Critical Infrastructure": 30596, | |
| "Cross-Site Scripting": 30531, | |
| "Cryptojacking": 30540, | |
| "Cyber Espionage": 30548, | |
| "Cyber Extortion": 30557, | |
| "Cyber Stalking": 30555, | |
| "Cyberbullying": 30597, | |
| "Cybercrime": 30655, | |
| "Cybersecurity": 30598, | |
| "DDoS": 30529, | |
| "DLP": 30601, | |
| "DNS": 30607, | |
| "DNS Hijacking": 30570, | |
| "DNS Spoofing": 30553, | |
| "Dark Web": 30599, | |
| "Data Breach": 30541, | |
| "Data Integrity": 30600, | |
| "Data Theft": 30602, | |
| "Decryption": 30603, | |
| "Detection and Response": 30604, | |
| "Digital Forensics": 30605, | |
| "Digital Transformation": 30606, | |
| "Drive-By Download": 30559, | |
| "Drive-By Download Attack": 30608, | |
| "Eavesdropping": 30556, | |
| "Encryption": 30609, | |
| "Endpoint Protection": 30610, | |
| "Exploit": 30611, | |
| "FIDO": 30612, | |
| "File Injection": 30565, | |
| "Fileless Malware": 30560, | |
| "Firewall": 30613, | |
| "Formgrabbing": 30569, | |
| "Formjacking": 30547, | |
| "Greylist": 30614, | |
| "Hacker": 30615, | |
| "Honeypot": 30616, | |
| "IAM": 30617, | |
| "IOC": 30618, | |
| "IPS": 30621, | |
| "Identity Theft": 30542, | |
| "In-line Network Device": 30619, | |
| "Insider Threat": 30620, | |
| "IoT": 30622, | |
| "Keylogger": 30535, | |
| "Logic Bomb": 30561, | |
| "Macroviruses": 30571, | |
| "Malvertising": 30566, | |
| "Malware": 30525, | |
| "Man-In-The-Middle Attack": 30532, | |
| "Man-in-the-Middle": 30623, | |
| "PII": 30627, | |
| "Packet Sniffing": 30572, | |
| "Parental Controls": 30624, | |
| "Patch": 30625, | |
| "Pen Testing": 30626, | |
| "Pharming": 30562, | |
| "Phishing": 30524, | |
| "Process Hollowing": 30628, | |
| "RDP": 30629, | |
| "Ram Scraping": 30573, | |
| "Ransomware": 30522, | |
| "Risktool": 30630, | |
| "Rootkit": 30536, | |
| "SECaaS": 30633, | |
| "SIEM": 30638, | |
| "SIM Swapping": 30639, | |
| "SOAR": 30640, | |
| "SOC": 30636, | |
| "SQL Injection": 30530, | |
| "SSL": 30634, | |
| "Sandbox": 30631, | |
| "Scareware": 30632, | |
| "Security Incident Response": 30635, | |
| "Security Perimeter": 30637, | |
| "Session Hijacking": 30554, | |
| "Smishing": 30551, | |
| "Sniffing": 30544, | |
| "Social Engineering": 30533, | |
| "Spam": 30641, | |
| "Spear Phishing": 30642, | |
| "Spoofing": 30543, | |
| "Spyware": 30526, | |
| "Threat Assessment": 30643, | |
| "Threat Hunting": 30644, | |
| "Threat Intelligence": 30645, | |
| "Trojan": 30527, | |
| "Typosquatting": 30558, | |
| "VPN": 30648, | |
| "Virus": 30647, | |
| "Vishing": 30550, | |
| "Vulnerability": 30649, | |
| "WAF": 30650, | |
| "Watering Hole Attack": 30552, | |
| "Whaling": 30549, | |
| "White Hat": 30651, | |
| "Worm": 30653, | |
| "Zero-Day Exploit": 30534, | |
| "Zero-day Exploit": 30654, | |
| "url": 30523 | |
| } | |