Explore Log360's comprehensive cybersecurity glossary—a collection of expert articles on attacks, threats,
and essential cybersecurity concepts to empower and protect your organization.
Access tokens are used by Windows applications to access APIs....
Learn more...Organizations with a digital presence have been contending with this...
Learn more...Credential dumping refers to the act of obtaining user credentials...
Learn more...XSS (cross-site scripting), is a prominent security vulnerability in web...
Learn more...Data exfiltration is the unauthorized access and retrieval of sensitive...
Learn more...This AD-targeting attack technique aims to allow attackers with privileged...
Learn more...A supply chain consists of all the stakeholders involved in...
Learn more...When it comes to domain modification, adversaries may change the...
Learn more...When attackers intrude and attempt to infect your network, malicious...
Learn more...Indicators of compromise (IoCs) are clues or digital footprints that...
Learn more...Kerberos authentication protocol uses tickets for verifying the identities and...
Learn more...Lateral movement in cybersecurity is a technique where attackers, after...
Learn more...The MITRE ATT&CK® framework is a globally recognized, comprehensive matrix...
Learn more...Next-gen SIEM represents the evolution of traditional SIEM. By incorporating...
Learn more...Pass-the-hash is an attack technique attackers use to obtain the...
Learn more...A pass-the-ticket attack is a type of cyberattack that involves...
Learn more...Privilege escalation is the act of evading established access and...
Learn more...WinPEAS, also known as Windows privilege escalation awesome scripts, is...
Learn more...Process injection involves inputting malicious code to a web application...
Learn more...Cybersecurity is a field where defenders and attackers continuously evolve...
Learn more...Developed by SpecterOps, BloodHound enables security professionals to uncover potential...
Learn more...SharpUp is a C# port of various PowerUp functionalities. It...
Learn more...Windows security identifier (SID) is a unique value that identifies...
Learn more...Supply chain attacks are a sophisticated, increasingly common form of...
Learn more...Command-line process logging entails recording the details of commands executed...
Learn more...Access tokens are used by Windows applications to access APIs. An access token contains information like who initiated a process, the app that generated the token and its expiry time.
Learn moreAccount manipulation is a technique used by attackers to gain access to critical resources. In this technique, the attacker gets hold of a user account which doesn't have enough privileges to access the required resource or data, and elevates its privileges.
Learn moreOrganizations with a digital presence have been contending with this challenge for a long time. Much like software developers continually update their code to stay ahead of vulnerabilities, cyberthreats undergo constant adaptations, expanding their digital frontier.
Learn moreA brute force attack is a type of cyberattack in which an attacker systematically tries all possible combinations of passwords or encryption keys until the correct one is found. The primary goal of a brute force attack is to gain unauthorized access to a system, a network, or an account.
Learn moreCredential dumping refers to the act of obtaining user credentials (username and password) from an operating system or software. These are normally obtained in the form of a hash or clear text, which is then used to perform lateral movement, gain access to restricted information, or to install malware.
Learn moreXSS (cross-site scripting), is a prominent security vulnerability in web applications, where an adversary adds a malicious code into legitimate web pages. The malicious code can be injected in several ways, for instance it can be added to the end of a URL or posted directly onto a page that displays user-generated content.
Learn moreData exfiltration is the unauthorized access and retrieval of sensitive data with malicious intentions. This can also lead to stolen and leaked confidential information and ransom demands.
Learn moreThis AD-targeting attack technique aims to allow attackers with privileged rights and credentials to create a rogue DC and mimic it by replicating malicious objects in AD environment.
Learn moreA supply chain consists of all the stakeholders involved in the journey of a product from its inception to its delivery to customers. This is mostly linear and the players involved leave the picture once their role is complete.
Learn moreWhen attackers intrude and attempt to infect your network, malicious external IP addresses and URLs are the one of the most obvious indicators of compromise (IoCs) in your logs. Security and threat intelligence agencies such as AbuseIPDB and RobTex compile and maintain these IoCs for the enterprises to use.
Learn moreInitial access is a set of techniques that exploit different entry vectors to gain the initial foothold in an organization's network. There are nine initial access techniques in total (some of which that have sub-techniques) and they include various social engineering methodologies and exploitation methods of public-facing web servers.
Learn moreInsider threats are security risks that originate from users having legitimate access to an organization's network and databases. These users can be current or former employees or third-party vendors or partners with legitimate user credentials.
Learn moreIndicators of compromise (IoCs) are clues or digital footprints that are used by security incident response teams to spot a network intrusion or an ongoing data breach. Some examples of IoCs include unusual outbound traffic, unauthorized privilege escalation, and suspicious resource access attempts.
Learn moreA Golden Ticket attack is a powerful domain persistence attack carried out by abusing vulnerabilities in the Kerberos authentication protocol to forge authentication tickets and gain unlimited access to all the Kerberos-enabled services in the domain, including the domain controller services, file servers, DNSs, print servers, and more.
Learn moreMalware is a portmanteau of malicious and software. It refers to a variety of harmful programs designed to infiltrate, damage, or disable computers and computer systems. It includes a variety of harmful programs—like viruses, worms, Trojan horses, spyware, ransomware, and adware—which perform unauthorized actions on affected systems.
Learn moreWhen your system falls a victim to a malware attack, multiple malicious files can be installed on your system. These files masquerade their existence and execute undesirable procedures in your systems until they are discovered.
Learn moreMimikatz takes advantage of the weaknesses present in a Windows system and uses many techniques to extract sensitive information, like passwords from AD domain controllers, the LSASS process memory, the SAM database, and other credential storage areas.
Learn moreThe MITRE ATT&CK® framework is a globally recognized, comprehensive matrix used by cybersecurity professionals to categorize and understand adversary tactics, techniques, and procedures (TTPs). It helps organizations detect and mitigate cyberattacks by modeling real-world adversarial behaviors.
Learn moreA network security key is a type of digital password that grants access to Wi-Fi networks and protects data transmission between connected devices. Often referred to as a Wi-Fi password, the network security key ensures only authorized users and devices can connect to a network
Learn moreNetwork sniffing is a technique employed by adversaries to observe and capture data as it travels through a network to steal the target's data. Specific tools or software are used to intercept and analyze the data that is being transmitted, like emails, website visits, or login details.
Learn moreNext-gen SIEM represents the evolution of traditional SIEM. By incorporating advanced technologies like artificial intelligence, machine learning (ML), and behavioral analytics, next-gen SIEM platforms can dynamically analyze vast datasets in real time, enabling the identification of subtle, evolving threats that traditional systems might overlook.
Learn morePass-the-hash is an attack technique attackers use to obtain the NTLM or LANMAN hash of a user's password instead of the plain text password so they can use it to dupe an authentication system. This strategy, highly prevalent on Windows systems, is one of the successful lateral movement techniques.
Learn moreA pass-the-ticket attack is a type of cyberattack that involves the theft and reuse of authentication credentials called tickets in a Windows Active Directory environment.
Learn morePrivilege escalation is the act of evading established access and authorization controls in an enterprise network to gain elevated privileges and access critical network assets.
Learn moreWinPEAS, also known as Windows privilege escalation awesome scripts, is an open source tool created by CarlosPolop. It is used to search for all possible paths to escalate privileges on Windows hosts and uses a color-coded system that shows which areas require attention.
Learn moreCybersecurity is a field where defenders and attackers continuously evolve their tactics to outsmart each other. This dynamic is especially evident in the roles played by various specialized teams within cybersecurity, namely the red, blue, and purple teams.
Learn moreDeveloped by SpecterOps, BloodHound enables security professionals to uncover potential attack paths and identify high-risk users by using a graph database and calculating the shortest path between objects by using its links.
Learn moreSharpUp is a C# port of various PowerUp functionalities. It is essentially a tool created for security professionals, specifically those working in the area of cybersecurity and penetration testing.
Learn moreWindows security identifier (SID) is a unique value that identifies a user, computer account or group. When creating an account, the domain controller (DC) issues a unique SID to each account, which is stored in the database.
Learn moreSocial engineering is a form of cyberattack with techniques that manipulate users into making security mistakes or giving away sensitive information.
Learn moreSupply chain attacks are a sophisticated, increasingly common form of cyberthreat that exploit the interconnected nature of modern business relationships, targeting less secure elements in the network, such as third-party vendors, software suppliers, or hardware manufacturers.
Learn more