September 1, 2025
Phishing is an attack method that uses email as a delivery mechanism to trick users into clicking on malicious links or downloading attachments.
Password cracking is the process of recovering the plaintext password from a cryptographic hash or encrypted password. Penetration testers often use password cracking techniques to identify weak passwords to help improve security.
Red team engagements simulate real-world cyber attacks. Learn how they differ from pentesting, and why organisations use them to strengthen security.
Discover the importance of penetration testing for businesses, how it differs from vulnerability scanning, and the types of pentesting services available.
What is a vulnerability scan and why does it matter? A vulnerability assessment can help proactively identify security risks before they can be exploited.
An asset is any component of your IT environment that has value to your organisation. This includes hardware (servers, routers), software (applications, databases), data (customer information, intellectual property), and even people (employees, contractors). Identifying and managing assets is crucial for effective cybersecurity.
In terms of the Attack Surface Center, assets can be domains, IP addresses, hostnames, subdomains, code repositories, cloud storage, or any other identifiable component that can be scanned or associated with vulnerabilities.
An attack surface is the exposed area of a system or network that can be targeted by attackers. It includes all potential entry points, such as software applications, network interfaces, and user accounts. Reducing the attack surface is crucial for improving security.
A vulnerability is a flaw or weakness in a system’s design, implementation, or operation that could be exploited by a threat actor to compromise security. Examples include outdated software, misconfigured settings, or weak passwords.
Within the Attack Surface Center platform, vulnerabilities are associated with assets, services, and URLs to provide a complete view of potential security risks. Vulnerabilities can be identified through automated scans, manual testing, or our integrations.
Threat intelligence refers to the collection and analysis of information about current and emerging cyber threats. It helps organisations anticipate, prevent, and respond to attacks by understanding attacker tactics and trends.
Penetration testing is a simulated cyberattack performed by security professionals to identify and address vulnerabilities in a system before real attackers can exploit them. It’s a proactive way to strengthen defenses.
If you are looking for penetration testing services, you can find more information on our Penetration Testing services page.
An endpoint is any device that connects to a network, such as a laptop, smartphone, or server. Endpoints are common targets for cyberattacks, so securing them is crucial for overall network security. User endpoints are commonly targeted by attackers through social engineering, malware, or interception attacks to gain an initial foothold in a network.
A zero-day is a newly discovered vulnerability that is unknown to a software vendor and has no available fix. Attackers may exploit zero-days before developers can release a patch, making them highly dangerous and impactful to businesses.
A firewall is a physical security device or software that monitors and controls incoming and outgoing network traffic based on predetermined rules. It acts as a barrier between trusted and untrusted networks, helping prevent unauthorised access.
Encryption is the process of converting data into a coded format that can only be read by authorised parties. It protects sensitive information from unauthorised access, both in transit and at rest.
Encryption is a reversible process that transforms data from a readable format into an unreadable format, protected by (for example) a key or password. It allows the original data to be secured either in transit or at rest, and can be decrypted back to its original form with the correct encryption key.
Hashing is a one-way process that converts data into a string of characters of a fixed length, known as a hash. It can be used to either verify data integrity (that the data has not been altered) or to securely store data, such as passwords. Hashing is not reversible, and cannot be converted back to the original data. There are techniques that can be used to identify the plaintext (original data) from a hash that are most commonly used to crack passwords through cryptanalysis such as rainbow tables, brute force attacks, mutation or dictionary attacks.
Incident response is the set of procedures an organisation follows to detect, investigate, and recover from cybersecurity incidents. A strong incident response plan helps minimise damage and restore normal operations quickly.
Multi-Factor Authentication (MFA, also known as two-factor authentication or 2FA) is a security method that requires users to provide two or more forms of verification before accessing an account or system. This could include something you know (password), something you have (phone), or something you are (fingerprint).