airtag attack

Apple AirTag Attack

In April of 2021, Apple unveiled the AirTag, a tracking device that can be put on nearly anything so users don’t lose their valuables. Users frequently use these on their …

xss cybrary term

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) is an attack vector where hackers inject malicious code into a vulnerable web application. XSS differs from other web attack vectors in that it does not directly …

csrf cybrary

Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF), also known as XSRF, is an attack method that fools a web browser into performing unwanted actions in a user application. Similar to Phishing Attacks, CSRFs …

Brute Force Attack

A Brute Force Attack is a strategy used by hackers trying to break into your data, password, or network. In this attack a computer, or its Graphics Processing Unit (GPU) will …

Countermeasure

A countermeasure in the cybersecurity world, is an action, procedure, or technique that decreases the likelihood of an attack by minimizing either the harm it can cause or the likelihood …

Attack

An Attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. In other words, the intentional act of attempting …

Attacker

An Attacker is an individual, group, organization, or government that executes an attack.  Not to be confused with a vulnerability.  An attack in the physical world might be someone who …

cyber criminals

Cyber Criminals

Cyber Criminals are individuals or teams of people who use technology to commit malicious activities on digital devices or networks with the intention of stealing sensitive company information, personal data, …

malicious code cybrary

Malicious Code

Secure your business with CyberHoot Today!!! Sign Up Now Malicious Code is harmful computer code or web script designed to create system vulnerabilities leading to backdoors, security breaches, information/data theft, …

active attack cybrary

Active Attack

An Active Attack is a network exploit where hackers strive to change or exfiltrate data on the target’s network or device. There are several different types of active attacks or …

Antivirus Software

Antivirus Software is a program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes done by …