|
- Highly Evasive Adaptive Threat - Wikipedia
A Highly Evasive Adaptive Threat (HEAT) is a cybersecurity attack type designed to bypass traditional network security defenses [1] [2] HEAT attacks are designed to find ways around protections that have been in place for years [3] HEAT attacks are able to bypass typical cybersecurity controls, such as secure web gateways (SWG) and anti-malware capabilities, through malicious links disguised
- Intrusion detection system evasion techniques - Wikipedia
Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS) Almost all published evasion techniques modify network attacks The 1998 paper Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection popularized IDS evasion, and discussed both evasion techniques and areas where the
- Evasion (network security) - Wikipedia
Evasion (network security) In network security, evasion is bypassing an information security defense in order to deliver an exploit, attack, or other form of malware to a target network or system, without detection
- Malware - Wikipedia
Malware (a portmanteau of malicious software) [1] is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy [1][2][3][4][5] Researchers tend to classify
- Drive-by download - Wikipedia
Drive-by download In computer security, a drive-by download is the unintended download of software, typically malicious software The term "drive-by download" usually refers to a download which was authorized by a user without understanding what is being downloaded, such as in the case of a Trojan horse
- Jigsaw (ransomware) - Wikipedia
Jigsaw is a form of encrypting ransomware malware created in 2016 It was initially titled "BitcoinBlackmailer", but later came to be known as "Jigsaw" due to featuring an image of Billy the Puppet from the Saw film franchise [1] The malware encrypts computer files and gradually deletes them, demanding payment of a ransom to decrypt the files and halt the deletion [2]
- Spectre (security vulnerability) - Wikipedia
Especially, they show that it is easy to generate evasive versions of these attacks to build malware instead of their generic gadgets to bypass current antivirus applications
- SpyEye - Wikipedia
SpyEye is a malware program that attacks users running Google Chrome, Safari, Opera, Firefox and Internet Explorer on Microsoft Windows operating systems [1] This malware uses keystroke logging and form grabbing to steal user credentials for malicious use [1][2] SpyEye allows hackers to steal money from online bank accounts and initiate transactions even while valid users are logged into
|
|
|