-
FIND ALL YOUR CYBER SECURITY ANSWERS ON OUR WIKI PAGE
The Cert2Connect wiki for a clear overview of terminology and the many abbreviations in the cyber, cloud and software security landscape.
Malware
Articles count
Malware
Malware is short for "malicious software" and is also referred to as "malicious software". It is software designed to harm computer systems, networks or mobile devices and can take various forms, such as viruses, trojans, spyware, ransomware and adware.
Updated on 07 Aug, 2023
View related articles
- Payment Card Industry Data Security Standard (PCI DSS)
- Advanced Persistent Threat (APT)
- Application Security
- AppSec Awareness
- Attack Based Vulnerability Management (ABVM)
- Attack Surface Management
- BEC or CEO fraud
- BlueTeam
- Breach & Attack Simulation
- Cloud Security Posture Management (CSPM)
- Command & Control (C&C) server
- Compliance
- Computer Emergency Response Team (CERT)
- Computer Misuse Detection System (CMDS)
- Content Disarm and Reconstruction (CDR) solution
- Continuous Security Validation (CSV)
- Continuous Threat Exposure Management (CTEM)
- DAST
- DEVOPS
- DevSecOps
- DLP
- DoS, DDoS
- Dynamic Behavioral Analysis
- EmailGateway
- Endpoint Detection and Response (EDR)
- Endpoint Security
- Full Kill Chain
- General Data Protection Regulation (GDPR)
- HAR files
- IAST
- IDE
- Immediate Threat Intelligence (ITI)
- Indirect Code Execution
- Intrusion Detection and Prevention System (IDPS)
- Lateral Movement
- Magecart
- Managed Detection and Response (MDR)
- Managed Security Service Provider (MSSP)
- MITRE ATT&CK Framework
- Multi Factor Authentication (MFA)
- NIST
- NIST Risk Management Framework
- OSINT
- OWASP
- Penetration Test or Pentest
- PII
- PowerShell
- Purple Team
- Ransomware
- Red Team
- Risk Mitigation
- Risk Based Vulnerability Management (RBVM)
- SAML/SSO
- Sandbox
- SAST
- SBOM
- SDLC
- Secure Email Gateways (SEGs)
- Security Information and Event Management (SIEM)
- Security Posture Management
- SIEM/SOAR processes
- Sigma Rules
- SOC
- SQL injections
- Tactics, Techniques, and Procedures (TTP)
- Third party risks
- TPRM
- Trojans
- Vulnerability management
- WannaCry
- Web Application Firewall (WAF)
- Web skimming
- Worms
- XDR
- Zero Day
- Zero Day Vulnerability
- “Watering Hole” Attack
- Infrastructure as Code (IaC)
- CI/CD-pipeline
- Codebashing
- SCM
- CI-server
- SCA
- Container Security
- Terraform
- Kubernetes
- Docker
- AWS CloudFormation
- Ansible
- Helm
- Google Deployment Manager
- AWS SAM
- Microsoft ARM
- OpenAPI 3.0
- GitHub
- GitLab
- Jira
- Security-by-design
- Azure Boards
- Darkweb
- Repositories
- YAML