Cyber Threats

Start Your 30-Day trial today!

What is polymorphic malware and how does it work? Polymorphic malware is a type of malicious software that continuously changes its code or appearance to evade detection by traditional antivirus...

What is a packet fragmentation attack? A packet fragmentation attack is a type of network exploit where attackers deliberately manipulate the fragmentation of IP packets to bypass security controls or...

What is a watering hole attack and how does it work? A watering hole attack is a cyberattack strategy in which hackers compromise a website or service frequently visited by...

What is pharming? Pharming is a cyberattack technique where attackers redirect users from legitimate websites to fraudulent ones, often without their knowledge, to steal sensitive information like usernames, passwords, or...

What is a web shell? A web shell is a malicious script or program that attackers upload to a web server to gain remote control over the server and its...

What is bluesnarfing, and how does it work? Bluesnarfing is a type of cyberattack that exploits Bluetooth technology to access sensitive information stored on a device without the owner’s knowledge...

What is bluejacking, and how does it work? Bluejacking is the act of sending unsolicited messages to nearby devices using Bluetooth technology. It’s often considered a prank rather than a...

What is data exfiltration and how does it happen? Data exfiltration, also known as data theft or unauthorized data transfer, occurs when sensitive or critical information is transferred out of...

What is Cross-Site Request Forgery (CSRF) and how does it work? Cross-Site Request Forgery (CSRF) is a web security vulnerability that tricks an authenticated user into performing unwanted actions on...

Control Access. Control Risk.

Protect your critical IT assets with Portnox’s radically simple cloud-native unified access control platform. No hassles. No BS.

WEBINAR: Next Generation ZTNA (April 16 @ 12pm ET)

X