-
FIND ALL YOUR CYBER SECURITY ANSWERS ON OUR WIKI PAGE
The Cert2Connect wiki for a clear overview of terminology and the many abbreviations in the cyber, cloud and software security landscape.
Malware
Articles count
Malware
Malware is short for "malicious software" and is also referred to as "malicious software". It is software designed to harm computer systems, networks or mobile devices and can take various forms, such as viruses, trojans, spyware, ransomware and adware.
Updated on 07 Aug, 2023
View related articles
- Advanced Persistent Threat (APT)
- AppSec Awareness
- BEC or CEO fraud
- BlueTeam
- Command & Control (C&C) server
- Content Disarm and Reconstruction (CDR) solution
- DAST
- DevSecOps
- DLP
- DoS, DDoS
- Dynamic Behavioral Analysis
- Full Kill Chain
- HAR files
- IAST
- IDE
- Indirect Code Execution
- Magecart
- NIST
- NIST Risk Management Framework
- OSINT
- OWASP
- Penetration Test or Pentest
- PII
- Purple Team
- Ransomware
- Red Team
- SAML/SSO
- Sandbox
- SAST
- SDLC
- Secure Email Gateways (SEGs)
- SIEM/SOAR processes
- SOC
- SQL injections
- Third party risks
- Trojans
- WannaCry
- Web Application Firewall (WAF)
- Worms
- XDR
- MITRE ATT&CK Framework
- TPRM
- Application Security
- Vulnerability management
- DEVOPS
- Compliance
- Web skimming
- SBOM
- “Watering Hole” Attack
- Breach & Attack Simulation
- Security Posture Management
- Attack Surface Management
- Attack Based Vulnerability Management (ABVM)
- Computer Emergency Response Team (CERT)
- Computer Misuse Detection System (CMDS)
- Cloud Security Posture Management (CSPM)
- Continuous Security Validation (CSV)
- Continuous Threat Exposure Management (CTEM)
- Endpoint Detection and Response (EDR)
- EmailGateway
- Endpoint Security
- General Data Protection Regulation (GDPR)
- Immediate Threat Intelligence (ITI)
- Intrusion Detection and Prevention System (IDPS)
- Lateral Movement
- Managed Detection and Response (MDR)
- Multi Factor Authentication (MFA)
- Risk Mitigation
- Managed Security Service Provider (MSSP)
- Payment Card Industry Data Security Standard (PCI DSS)
- PowerShell
- Risk Based Vulnerability Management (RBVM)
- Security Information and Event Management (SIEM)
- Sigma Rules
- Tactics, Techniques, and Procedures (TTP)
- Zero Day Vulnerability
- Zero Day
- Infrastructure as Code (IaC)
- CI/CD-pipeline
- Codebashing
- SCM
- CI-server
- SCA
- Container Security
- Terraform
- Kubernetes
- Docker
- AWS CloudFormation
- Ansible
- Helm
- Google Deployment Manager
- AWS SAM
- Microsoft ARM
- OpenAPI 3.0
- GitHub
- GitLab
- Jira
- Security-by-design
- Azure Boards
- Darkweb
- Repositories
- YAML
