Cloud Security

Cyberattack and cybersecurity terms related to cloud security

Privilege escalation

Not every exploit results in complete and unrestricted access to a victim’s network or host.


Before any operation begins, a threat actor or group must conduct reconnaissance to gather information about their target.

East-West attack

An east-west attack, also known as a lateral attack, refers to the techniques that threat actors use to progressively manoeuvre through and gain further access to valuable data and assets.

North-South attack

Cyber security attacks that originate outside of the network are known as north-south attacks.

Lateral movement

After an attacker has gained an initial foothold in a network, they will typically seek to widen and cement that foothold, this techniquie is known as lateral movement.

Data exfiltration

Data exfiltration is a form of security breach that occurs when a malicious actor conducts an unauthorized data transfer.


Cryptomining is the process by which crypto currencies, such as Bitcoin, are created.

Stolen credentials

Stolen credentials are leaked or compromised user login details e.g., username and password.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center