infosecsimplified
Here are 45 public repositories matching this topic...
Sort:Most stars
An adversary may utilize a sim swapping attack for defeating 2fa authentication
- Updated
Jan 29, 2024
An adversary may utilize a sim swapping attack for defeating 2fa authentication
- Updated
Jan 29, 2024
Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks
- Updated
Jan 29, 2024
Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)
- Updated
Feb 18, 2024
Incident response is a set of steps that are used to handle the aftermath of a data breach or cyberattack
- Updated
Jan 29, 2024
Digital Forensics is the process of finding and analyzing electronic data
- Updated
Jan 29, 2024
An adversary may inject malicious content into a vulnerable target
- Updated
Jul 9, 2025
Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks
- Updated
Jan 29, 2024
A threat actor may list files on a misconfigured server
- Updated
Jan 29, 2024
A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target
- Updated
Jan 29, 2024
A threat actor may inject malicious content into webapp. The payload is reflected in the HTTP request and response, then executed in the victim's browser
- Updated
Jul 9, 2025
A threat actor may perform unauthorized functions belonging to another user with a higher privileges level
- Updated
Jan 29, 2024
Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse
- Updated
Jan 29, 2024
A threat actor may trick a victim into executing native template syntax on a vulnerable target
- Updated
Jan 29, 2024
A threat actor may inject malicious content into webapp. The payload is not reflected in the HTTP request and response, then executed in the victim's browser
- Updated
Jul 9, 2025
A threat actor may send a malicious redirect request for a vulnerable target to a victim; the victim gets redirected to a malicious website that threat actor controls
- Updated
Jul 9, 2025
Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to operate (Preventing them or minimizing their harmful impact)
- Updated
Jan 29, 2024
A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's files
- Updated
Jan 29, 2024
A threat actor may bypass the Completely Automated Public Turing test to tell Computers and Humans Apart (captcha) by breaking the solving logic, human-assisted solving services, or utilizing automated technology
- Updated
Jan 29, 2024
A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism
- Updated
Jan 29, 2024
Improve this page
Add a description, image, and links to theinfosecsimplified topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with theinfosecsimplified topic, visit your repo's landing page and select "manage topics."