Data Breach
A security incident during which confidential data or sensitive information is stolen or taken from a system, without the knowledge or authorization of the system’s owners, by either malicious insiders or external attackers.
A security incident during which confidential data or sensitive information is stolen or taken from a system, without the knowledge or authorization of the system’s owners, by either malicious insiders or external attackers.
Data exfiltration, data loss or data leakage is essentially the removal of information or data from an electronic device, typically a computer, mobile phone or other Internet connected device.
Data integrity refers to the accuracy, completeness, consistency and validity of data over its lifecycle.
Data Loss Prevention (DLP) are solutions and technologies that detect and prevent data breaches, exfiltration and unwanted data destruction. It does this by helping network admin and cybersecurity professionals to control which data users can transfer. As it blocks data exfiltration, organizations use it for internal security and regulatory compliance.
Decryption is the process of converting data that was unreadable, due to encryption, back to its original format that is both readable and understood by either a human or a computer. To decrypt data, a key or password is usually required.
Deepfake is a form of artificial intelligence (AI) that us used to accurately impersonate others in hoax images, sounds or videos. All the creator needs are images, videos and audio recordings of the individuals they wish to impersonate.
A Denial of Service (DoS) attack is an attack used to disable, shut down or disrupt a network, website, or service, making it inaccessible to its intended users. This is accomplished by flooding the target with traffic or sending it information that will trigger a crash, preventing legitimate users from using the service [...]
A dictionary attack is a systematic, brute-force technique during which attackers will run common words and phrases, along with their simple variations, to guess passwords.
Distributed Denial of Service attacks are a type of cybercrime which uses numerous systems to perform an attack, aiming to exceed a website’s capacity to handle requests and therefore prevent the website from functioning properly for online users. The attacker will flood a server with internet traffic to prevent users from accessing online services, [...]
Double extortion ransomware is a type of cyberattack where threat actors first exfiltrate a victim's sensitive data before encrypting it, giving the cybercriminals additional leverage to collect one or more ransom payments.