|
{ |
|
"2FA": 30646, |
|
"Ad Fraud": 30568, |
|
"Advanced Persistent Threat": 30574, |
|
"Advanced Threat Protection": 30575, |
|
"Adware": 30576, |
|
"Anti-Botnet": 30577, |
|
"Anti-Malware": 30578, |
|
"Anti-Phishing": 30579, |
|
"Anti-Virus": 30580, |
|
"Attack Vector": 30581, |
|
"Authentication": 30582, |
|
"BYOC": 30588, |
|
"BYOD": 30589, |
|
"BYOL": 30590, |
|
"Backdoor": 30537, |
|
"Banker Trojan": 30583, |
|
"Black Hat": 30652, |
|
"Blacklist": 30584, |
|
"Bot": 30585, |
|
"Botnet": 30528, |
|
"Browser Hijacking": 30563, |
|
"Brute Force Attack": 30539, |
|
"Buffer Overflow": 30545, |
|
"Business Continuity Plan": 30586, |
|
"Business Disruption": 30587, |
|
"CAPTCHA": 30591, |
|
"COTS": 30595, |
|
"Click Fraud": 30567, |
|
"Click Jacking": 30546, |
|
"Clickjacking": 30592, |
|
"Clientless": 30593, |
|
"Code Injection": 30594, |
|
"Credential Harvesting": 30564, |
|
"Credential Stuffing": 30538, |
|
"Critical Infrastructure": 30596, |
|
"Cross-Site Scripting": 30531, |
|
"Cryptojacking": 30540, |
|
"Cyber Espionage": 30548, |
|
"Cyber Extortion": 30557, |
|
"Cyber Stalking": 30555, |
|
"Cyberbullying": 30597, |
|
"Cybercrime": 30655, |
|
"Cybersecurity": 30598, |
|
"DDoS": 30529, |
|
"DLP": 30601, |
|
"DNS": 30607, |
|
"DNS Hijacking": 30570, |
|
"DNS Spoofing": 30553, |
|
"Dark Web": 30599, |
|
"Data Breach": 30541, |
|
"Data Integrity": 30600, |
|
"Data Theft": 30602, |
|
"Decryption": 30603, |
|
"Detection and Response": 30604, |
|
"Digital Forensics": 30605, |
|
"Digital Transformation": 30606, |
|
"Drive-By Download": 30559, |
|
"Drive-By Download Attack": 30608, |
|
"Eavesdropping": 30556, |
|
"Encryption": 30609, |
|
"Endpoint Protection": 30610, |
|
"Exploit": 30611, |
|
"FIDO": 30612, |
|
"File Injection": 30565, |
|
"Fileless Malware": 30560, |
|
"Firewall": 30613, |
|
"Formgrabbing": 30569, |
|
"Formjacking": 30547, |
|
"Greylist": 30614, |
|
"Hacker": 30615, |
|
"Honeypot": 30616, |
|
"IAM": 30617, |
|
"IOC": 30618, |
|
"IPS": 30621, |
|
"Identity Theft": 30542, |
|
"In-line Network Device": 30619, |
|
"Insider Threat": 30620, |
|
"IoT": 30622, |
|
"Keylogger": 30535, |
|
"Logic Bomb": 30561, |
|
"Macroviruses": 30571, |
|
"Malvertising": 30566, |
|
"Malware": 30525, |
|
"Man-In-The-Middle Attack": 30532, |
|
"Man-in-the-Middle": 30623, |
|
"PII": 30627, |
|
"Packet Sniffing": 30572, |
|
"Parental Controls": 30624, |
|
"Patch": 30625, |
|
"Pen Testing": 30626, |
|
"Pharming": 30562, |
|
"Phishing": 30524, |
|
"Process Hollowing": 30628, |
|
"RDP": 30629, |
|
"Ram Scraping": 30573, |
|
"Ransomware": 30522, |
|
"Risktool": 30630, |
|
"Rootkit": 30536, |
|
"SECaaS": 30633, |
|
"SIEM": 30638, |
|
"SIM Swapping": 30639, |
|
"SOAR": 30640, |
|
"SOC": 30636, |
|
"SQL Injection": 30530, |
|
"SSL": 30634, |
|
"Sandbox": 30631, |
|
"Scareware": 30632, |
|
"Security Incident Response": 30635, |
|
"Security Perimeter": 30637, |
|
"Session Hijacking": 30554, |
|
"Smishing": 30551, |
|
"Sniffing": 30544, |
|
"Social Engineering": 30533, |
|
"Spam": 30641, |
|
"Spear Phishing": 30642, |
|
"Spoofing": 30543, |
|
"Spyware": 30526, |
|
"Threat Assessment": 30643, |
|
"Threat Hunting": 30644, |
|
"Threat Intelligence": 30645, |
|
"Trojan": 30527, |
|
"Typosquatting": 30558, |
|
"VPN": 30648, |
|
"Virus": 30647, |
|
"Vishing": 30550, |
|
"Vulnerability": 30649, |
|
"WAF": 30650, |
|
"Watering Hole Attack": 30552, |
|
"Whaling": 30549, |
|
"White Hat": 30651, |
|
"Worm": 30653, |
|
"Zero-Day Exploit": 30534, |
|
"Zero-day Exploit": 30654, |
|
"url": 30523 |
|
} |
|
|