Everything you need to know to understand CyberLite Issue 8. Read the issue here.
Bug Bounty: A reward offered to a person who identifies an error or vulnerability in a computer program or system.
Zero Day: Refers to vulnerabilities that are unknown to the parties responsible for patching or fixing them.
Open Source Software: Software that anyone can modify or share, as its design and source code are publically accessible.
Ransomware: Blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.
Web Shell: A piece of code that enables a server to be controlled/administrated remotely. A user with access to a web shell for a server can send any commands they want to the server. Web shells are commonly accessed via a web browser.
Supply Chain Attack: This occurs when someone infiltrates an organization through an outside partner/provider that you’ve given access to your systems/data.