Glossary

    W
    copy link

    Watering hole attack

    This kind of attack starts with determining which websites are frequently visited by potential victims (such as employees of a company of interest). The attackers then compromise these websites and place malware on them. When victims subsequently visit these websites, malware may be downloaded to their devices.

    copy link

    Web shell

    A file that an attacker can upload to a server and then use to execute OS commands through its web interface and gain access to other files.

    copy link

    Web skimmer

    Malicious code injected into a page on a hacked site where the user enters payment card information, with the purpose of stealing such information.