by Alexander | 4 March 2025
Privilege escalation is a technique used in cyber security to obtain a higher level of access or control over a computer system than initially authorised. It enables an attacker or malicious user to move from an account or process with low privileges (e.g. standard user) to an account or process with high privileges (e.g. administrator, root or kernel access).
by Alexander | 17 February 2025
Data Poisoning is a cyber attack designed to intentionally corrupt the training data of an artificial intelligence or machine learning model in order to manipulate its predictions or decisions.
This technique involves inserting malicious or misleading data into the dataset used for learning, thereby compromising the integrity and reliability of the model.
by Alexander | 14 February 2025
In computing, the term "endpoint" can have several meanings. It generally refers to a terminal, a device connected to a network. Here are some common definitions...
by Alexander | 26 February 2025
A cyber security exploit is a code, technique or tool designed to exploit a specific vulnerability in a computer system, software, network or device. Its purpose is to take advantage of a security hole to perform unauthorised actions, such as taking control of a system, stealing data, installing malware or disrupting services.
by Alexander | 16 February 2025
In cybersecurity, a false positive (or false alarm) occurs when an IT security system (such as an antivirus, an intrusion detection system - IDS, an application firewall -...