Word Notes
Recent Episodes
A passwordless authentication protocol based on the FIDO2 standard.
A type of phishing attack that uses QR codes as the lure.
Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain. Definition two: Determining the responsibility for offensive cyber operations.
A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.
The ability to continuously deliver the intended outcome despite adverse cyber events.