cybersecurity phishing malware ransomware zero-day exploit vulnerability threat actor social engineering DDoS endpoint security firewall encryption authentication penetration testing threat intelligence compliance zero trust multi-factor authentication (MFA) incident response patch management rootkit spyware adware trojan worm virus botnet brute force attack man-in-the-middle (MitM) attack SQL injection cross-site scripting (XSS) denial of service (DoS) distributed denial of service (DDoS) VPN (Virtual Private Network) intrusion detection system (IDS) intrusion prevention system (IPS) security operations center (SOC) ethical hacking black hat hacker white hat hacker cybercrime cyber espionage data breach data loss prevention (DLP) cloud security mobile security internet of things (IoT) security application security network security security information and event management (SIEM) AI in cybersecurity blockchain security risk assessment access control cryptography decryption dark web cyber resilience business continuity plan (BCP) disaster recovery security architecture threat hunting malvertising keylogger shadow IT supply chain attack ransomware-as-a-service (RaaS) phishing simulation advanced persistent threat (APT) vishing smishing quishing deepfake endpoint detection and response (EDR) security awareness training remote access secure web gateway (SWG) DNS tunneling buffer overflow evil twin identity and access management (IAM) payload cyber warfare digital forensics passwordless authentication quantum computing security regulatory compliance GDPR NIST framework ISO/IEC 27001 data integrity CIA triad cyber kill chain attack vector threat modeling software development security (SDLC) secure coding perimeter security endpoint hardening threat intelligence platform (TIP) cloud access security broker (CASB) firewall-as-a-service (FWaaS) secure access service edge (SASE)