Cryptomining Cryptomining is the process by which crypto currencies, such as Bitcoin, are created. Data exfiltration Data exfiltration is a form of security breach that occurs when a malicious actor conducts an unauthorized data transfer. East-West attack An east-west attack, also known as a lateral attack, refers to the techniques that threat actors use to progressively manoeuvre through and gain further access to valuable data and assets. EC2 Elastic Compute Cloud (EC2) is a web service that provides secure, resizable compute capacity in the cloud. Endpoint Detection and Response (EDR) Endpoint detection and response (EDR) solutions record and store endpoint-system-level behaviors. Excessive Permissions Protecting against excessive permissions and responding quickly when those permissions are abused. Exposed Cloud Database An exposed cloud database is a database that has been inadvertently exposed due to a misconfiguration or vulnerability. Exposed Cloud Server A cloud server is a highly powerful virtual IT infrastructure that can host data and applications. However, if incorrectly configured the cloud server can be exposed. Previous 1 2 3 4 5 6 ... Next 1 2 3
Data exfiltration Data exfiltration is a form of security breach that occurs when a malicious actor conducts an unauthorized data transfer.
East-West attack An east-west attack, also known as a lateral attack, refers to the techniques that threat actors use to progressively manoeuvre through and gain further access to valuable data and assets.
EC2 Elastic Compute Cloud (EC2) is a web service that provides secure, resizable compute capacity in the cloud.
Endpoint Detection and Response (EDR) Endpoint detection and response (EDR) solutions record and store endpoint-system-level behaviors.
Excessive Permissions Protecting against excessive permissions and responding quickly when those permissions are abused.
Exposed Cloud Database An exposed cloud database is a database that has been inadvertently exposed due to a misconfiguration or vulnerability.
Exposed Cloud Server A cloud server is a highly powerful virtual IT infrastructure that can host data and applications. However, if incorrectly configured the cloud server can be exposed.