AIOps |
Artificial Intelligence for IT Operations
|
Helps organizations manage complex IT environments by detecting, diagnosing, and resolving issues more efficiently than traditional methods
AJAX |
asynchronous Javascript and XML
|
web
Ajax is not a technology, but rather a programming pattern. HTML and CSS can be used in combination to mark up and style information. The webpage can be modified by JavaScript to dynamically display (and allow the user to interact with) the new information. The built-in XMLHttpRequest object is used to execute Ajax on webpages, allowing websites to load content onto the screen without refreshing the page. Ajax is not a new technology, nor is it a new language. Instead, it is existing technologies used in a new way.
Akira |
ransomware group
|
Akira is known to have very comparable links to the old Conti cybercrime organisation, including code similarities with the ransomware payload and templated attacks that follow a playbook of procedures to carry them out. Akira focuses on being a double extortion group, with the primary goal of extorting for financial gain. Akira follows in the same footsteps, using templated, playbook-driven attacks just like Conti.
They operate a double-extortion model, first stealing data, then encrypting it, demanding payment to prevent public leaks and restore systems.
Their primary method of entry is through SSL VPN exploitation (Cisco ASA, SonicWall, WatchGuard), often taking advantage of missing MFA or unpatched vulnerabilities.
Between 2023 to late 2024, the main method of entry seen by Zensec was the abuse of Cisco ASA firewalls to gain initial access. In the majority of the cases, this was either due to the lack of MFA on accounts and exploitable firewalls vulnerable to a remote “brute force” vulnerability (CVE-2023-20269) and CVE-2020-3259, a memory disclosure vulnerability which can be used to retrieve credentials without authentication.
From late 2024 to the present day, the most common initial access method by Akira is the abuse of SonicWall SSLVPNs, primarily the same methods are used with this line of firewall product. Password-based attacks against local VPN accounts and accounts linked to Active Directory. The use of CVE-2024-40766 is a high contributing factor.
During 2025, the first cases were observed originating from the SSLVPNs of Watchguard appliances, indicating that Watchguard appliances are now on Akira’s scopes going forward.
The most common discovery utilities seen in use by Akira:
Netscan seen in over 31% of cases.
Advanced Port Scanner 25% of intrusions
Advanced IP Scanner 12.5%
Powershell discovery methods:
In the incidents where PowerShell use was observed for discovery, the following commands were run to collect information on all AD users, Computers, Groups, Subnets, Organisational Units, AD trusts and domain controllers. Due to this, the following TXT files were created by the threat actor in these cases: AdSubnets.csv, AdGroups.txt, AdOUs.csv, AdComputers.txt, AdUsers.txt and AdTrusts.txt.
https://zensec.co.uk/blog/unmasking-akira-the-ransomware-tactics-you-cant-afford-to-ignore/
AMSI |
Antimalware Scan Interface
|
Microsoft
agnostic of antimalware vendor; it's designed to allow for the most common malware scanning and protection techniques provided by today's antimalware products that can be integrated into applications.
The AMSI feature is integrated into these components of Windows 10.
-User Account Control, or UAC (elevation of EXE, COM, MSI, or ActiveX installation)
-PowerShell (scripts, interactive use, and dynamic code evaluation)
-Windows Script Host (wscript.exe and cscript.exe)
-JavaScript and VBScript
-Office VBA macros
https://learn.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal
Angular |
front-end frameworks
|
programming
A TypeScript-based front-end framework developed and maintained by Google. It provides a comprehensive solution for building dynamic single-page applications.
Apache |
|
web
free and open-source cross-platform web server, released under the terms of Apache License 2.0. It is developed and maintained by a community of developers under the auspices of the Apache Software Foundation.
asm.js |
|
asm.js code is valid JavaScript, but it adheres to a very restricted set of features. This strictness allows JavaScript engines to apply aggressive optimizations, often compiling it to highly efficient machine code. While asm.js offered significant performance improvements, it was primarily a text-based format. It paved the way for WebAssembly (Wasm), which is a binary instruction format designed for a similar purpose but offering even greater efficiency and a more compact representation. n essence, asm.js served as a crucial stepping stone in bringing high-performance, compiled code to the web, ultimately leading to the development and widespread adoption of WebAssembly.
Azure |
|
Microsoft cloud platform. Launched 2010. Services include Computing, Identity, Mobile, Storage, Database, Mesaging(event hubs, queues, topics, relays), CDN -has 118 point-of-presence locations across 100 cities worldwide (also known as Edge locations) as of January 2023 -- At fiscal year-end 2025, Microsoft reported that Azure surpassed US$75 billion in annual revenue and operated over 400 datacenters across 70 regions.
BeyondTrust |
|
An American company that develops, markets, and supports a family of privileged identity management / access management (PIM/PAM), privileged remote access, and vulnerability management products. Founded in 2006, Acquired by Bomgar(old name) another developer of remote support tools. they use the name BeyondTrust.
Binary-to-text encoding |
|
encoding of data in plain text. More precisely, it is an encoding of binary data in a sequence of printable characters. These encodings are necessary for transmission of data when the communication channel does not allow binary data (such as email or NNTP) or is not 8-bit clean. PGP documentation (RFC 9580) uses the term "ASCII armor" for binary-to-text encoding when referring to Base64.
The basic need for a binary-to-text encoding comes from a need to communicate arbitrary binary data over preexisting communications protocols that were designed to carry only English language human-readable text. Those communication protocols may only be 7-bit safe (and within that avoid certain ASCII control codes), and may require line breaks at certain maximum intervals, and may not maintain whitespace. Thus, only the 94 printable ASCII characters are "safe" to use to convey data.
In contrast, most computers store data in memory organized in eight-bit bytes. Files that contain machine-executable code and non-textual data typically contain all 256 possible eight-bit byte values. Many computer programs came to rely on this distinction between seven-bit text and eight-bit binary data, and would not function properly if non-ASCII characters appeared in data that was expected to include only ASCII text. For example, if the value of the eighth bit is not preserved, the program might interpret a byte value above 127 as a flag telling it to perform some function.
It is often desirable, however, to be able to send non-textual data through text-based systems, such as when one might attach an image file to an e-mail message. To accomplish this, the data is encoded in some way, such that eight-bit data is encoded into seven-bit ASCII characters (generally using only alphanumeric and punctuation characters—the ASCII printable characters). Upon safe arrival at its destination, it is then decoded back to its eight-bit form. This process is referred to as binary to text encoding. Many programs perform this conversion to allow for data-transport, such as PGP and GNU Privacy Guard.
BlackCat |
aka ALHV aka Noberus
|
security
ransomware family written in Rust. Operates on a ransomware as a service (RaaS) model, with developers offering the malware for use by affiliates and taking a percentage of ransom payments.
The group targeted hundreds of organizations worldwide, including Reddit in 2023 and Change Healthcare in 2024. Since its first appearance it was one of the most active ransomware operations.
Buffer overflow |
|
A vulnerability where a program writes data beyond a buffer's allocated memory, overwriting adjacent memory locations. The resulting corrupted memory can cause system crashes, lead to incorrect program behavior, or be exploited by attackers to execute malicious code. This vulnerability is particularly common in low-level programming languages like C and C++, which lack automatic memory and bounds management.
https://www.youtube.com/watch?v=qpyRz5lkRjE
Burst buffer |
|
In high-performance computing, a fast intermediate storage layer positioned between the front-end computing processes and the back-end storage systems.
CHF |
cryptographic hash function
|
Cryptographic hash functions have many information-security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information-security contexts, cryptographic hash values are sometimes called (digital) fingerprints, checksums, (message) digests,[2] or just hash values, even though all these terms stand for more general functions with rather different properties and purposes.
chmod |
shell command
|
linux
for changing access permissions and special mode flags of files. The name is short for change mode where mode refers to the permissions and flags collectively.
CI/CD |
continuous integration/delivery
|
devops
a set of practices and tools in DevOps that automates the process of building, testing, and deploying software changes.
Cognex Corporation |
|
American manufacturer of machine vision systems, software and sensors used in automated manufacturing to inspect and identify parts, detect defects, verify product assembly, and guide assembly robots.
https://en.wikipedia.org/wiki/Cognex_Corporation
compiled vs interpreted |
languages
|
programming
Most compiled languages read a source code file, process it into native machine code (called object code) and then can also sometimes link the object code with system libraries to create machine-dependent native executable program files. C, C++, and many other languages work this way. Interpreted languages do not have directly executable files, but have a language interpreter that loads the source file and executes the statements therein. Python is an example of an interpreted language. JavaScript is a scripting language, and is closer to an interpreted language, but isn''t quite, as it is not designed to be used on its own, but from within another environment equipped with a JavaScript scripting engine, such as a web browser.
Java is a little different yet. It is not interpreted, it is a compiled language. However, it is not compiled to native executable code like C or C++. Instead, it is compiled to a bytecode file that is used by the Java Virtual Machine to convert the bytecode into native executable code. It does this so that the Java program is platform agnostic and can run on any system that supports a JVM without needing modifications. You can compare this with running a game console emulator on your computer. The emulator creates a simulated gaming console that runs files containing compiled images of the games (ROM files) and converts that code to run on its host. The important takeaway is that the JVM is not an interpreter or translator; it creates an emulated environment that is always the same, regardless of its host machine or host operating system, so that it can be seemingly platform independent.
From a programmer''s perspective, there is little difference working with an interpreted language, a compiled language, or a scripting language. The process is the same. You write human-readable code, and it gets executed on a machine. It is only the parts in-between those two that differ. Historically, languages that compile to native code allow the programmer the most flexibility because they can take advantage of every aspect of the machine they are programming. Interpreted languages strip away some of that flexibility in order to have a ""least common denominator"" approach to running the programs, and scripting languages are the most restrictive still, usually removing any ability whatsoever to directly access the host machine or its operating system and/or working with a limited set of features.
https://www.reddit.com/r/learnjava/comments/vgow91/in_actual_practice_what_does_it_mean_to_say_that/
curl |
command-line utility
|
linux
for transferring data to or from a server, employing a range of internet protocols such as HTTP, HTTPS, FTP, SCP, and SFTP, to download files, upload files, make API calls. It's installed by default on the majority of Linux distros.
https://www.geeksforgeeks.org/linux-unix/curl-command-in-linux-with-examples/
DarkSide |
|
Security
hacking group, believed to be based in Russia, that targets victims using ransomware and extortion; it is believed to be behind the Colonial Pipeline cyberattack of 2021.
DarkSide ransomware initially bypasses UAC using the CMSTPLUA COM interface, then creates a file named LOG.{userid}.TXT, which serves as a log file. The software deletes files in the recycle bin one by one, uninstalls certain security and backup software programs, and terminates processes to allow access to user data files. During the encryption process proper, a user ID is generated based on a MAC address and appear appended to filenames, and file data is encrypted with Salsa20 and a randomly generated matrix key (which, encrypted with a hardcoded RSA key, is itself appended to the file). However, the software avoids encrypting certain folders, files, and filetypes.
The group was first noticed in August 2020. Cybersecurity company Kaspersky described the group as an "enterprise" due to its professional-looking website and attempts to partner with journalists and decryption companies The group "has publicly stated that they prefer to target organizations that can afford to pay large ransoms instead of hospitals, schools, non-profits, and governments."
DarkSide ransomware hit the IT managed services provider CompuCom in March 2021, costing over US$20 million in restoration expenses; it also attacked Canadian Discount Car and Truck Rentals and Toshiba Corp.
devops |
|
a set of practices, tools, and a cultural philosophy that integrates software development (Dev) and IT operations (Ops) to shorten the development lifecycle and deliver software faster and more reliably -- The DevOps lifecycle is often depicted as an infinity loop, illustrating the continuous nature of software development and operations.
dkim |
domain keys identified ma
|
mail
is an email authentication method that uses public-key cryptography to verify the sender's identity and ensure that an email message hasn't been tampered with during transit. It works by creating a digital signature on outgoing emails using a private key, which is then verified by the recipient's server using the corresponding public key stored in the sender's DNS. This cryptographic process confirms that the sender is authorized and prevents spoofing, spam, and phishing attacks.
DNS |
Domain Name System
|
a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various information with domain names (identification strings) assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System has been an essential component of the functionality of the Internet since 1985.
Record types
A - IPv4
AAA- IPv6
CNAME- aliasing
MX - mail server
TXT - text
PTR - reverse lookup, the opposite of an A or AAAA record
SRV - service, host and port
CAA - Which CA's are allowed to issue SSL certs
Endianness |
|
programming
describes how multi-byte data (like integers) is stored in computer memory and transmitted, with the two main types being big-endian, which stores the most significant byte first, and little-endian, which stores the least significant byte first. The choice of endianness is specific to a computer architecture or network protocol and can cause misinterpretation if data is not converted between different endian formats, requiring protocols to specify byte order or use a byte order mark
exe |
executable
|
files
a general executable file that can perform various actions, including installing software,
Fibre Channel (FC) topologies |
|
3 primary types: Point-to-Point, Arbitrated Loop (FC-AL, up to 127 devices), and Fabric for large number of dvices in a high-performance network.
GFW |
Great Firewall of China
|
A combination of legislative actions and technologies enforced by the People''s Republic of China to regulate the Internet domestically. Besides censorship, the Great Firewall has also influenced the development of China''s internal internet economy by giving preference to domestic companies[11] and reducing the effectiveness of products from foreign internet companies.
Git |
|
a distributed version control software system that is capable of managing versions of source code or data. -- The Git feature that really makes it stand apart from nearly every other SCM out there is its branching model.
Git allows and encourages you to have multiple local branches that can be entirely independent of each other. The creation, merging, and deletion of those lines of development takes seconds.
https://git-scm.com/about/branching-and-merging
git-secret |
|
Encrypts files and stores them inside your git repository, providing a history of changes for every commit.
https://github.com/sobolevn/git-secret
GNU |
|
Linux
is an extensive collection of free software (387 packages as of June 2025),[5] which can be used as an operating system or can be used in parts with other operating systems. Written in various languages (notably C and assembly language)
HCI |
hyper-converged infra.
|
systems
in HCI both the storage area network and the underlying storage abstractions[clarification needed] are implemented virtually in software (at or via the hypervisor) rather than physically in hardware
HPC |
High-Performance Computing
|
Combining powerful computer resources, like supercomputers and clusters, to solve complex, computationally intensive problems that a single computer cannot, by leveraging large numbers of processors and high-speed networking to run large-scale simulations, analyze massive datasets, and accelerate tasks such as artificial intelligence, weather forecasting, and drug discovery
HPE Aruba Networking |
|
Networking
a Santa Clara, California-based security and networking subsidiary of Hewlett Packard Enterprise company.
HTML Living Standard |
|
web
Maintained by the Web Hypertext Application Technology Working Group (WHATWG), a consortium of the major browser vendors (Apple, Google, Mozilla, and Microsoft).
HTML5 |
|
web
HTML5 is a markup language used for structuring and presenting hypertext documents on the World Wide Web. It was the fifth and final major HTML version that is now a retired World Wide Web Consortium recommendation. The current specification is known as the HTML Living Standard. HTML5 includes detailed processing models to encourage more interoperable implementations; it extends, improves, and rationalizes the markup available for documents and introduces markup and application programming interfaces (APIs) for complex web applications.[8] For the same reasons, HTML5 is also a candidate for cross-platform mobile applications because it includes features designed with low-powered devices in mind.
httpd |
http daemon
|
web
the main software for the Apache HTTP Server
Hypervisor |
|
Virtualization
Can be just software or include firmware or hardware. Type 1 bare metal, serves as the 'hostOS', Type 2 hosted, runs as an application within another OS.
IAM |
identity and access management
|
a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate access to technology resources
Idempotent |
|
An HTTP method is idempotent if the intended effect on the server of making a single request is the same as the effect of making several identical requests. A client can safely retry a request that uses an idempotent method, for example, in cases where there is doubt as to whether the request reached the server. If multiple identical requests happen to reach the server, as long as the method is idempotent, no harm is done.
https://developer.mozilla.org/en-US/docs/Glossary/Idempotent
iframe |
|
web
The iframe HTML element represents a nested browsing context, embedding another HTML page into the current one.
iptables |
command line program
|
linux
the userspace command line program used to configure the Linux 2.4.x and later packet filtering ruleset.
https://www.netfilter.org/projects/iptables/index.html
Jira |
|
Project managmenet tool from Atlassian
jQuery |
|
jQuery is a fast, small, and feature-rich JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. With a combination of versatility and extensibility, jQuery has changed the way that millions of people write JavaScript.
JSON |
JavaScript Object Notation
|
Plain text format, used to send, receive, store, data, The syntax is derived from JavaScript object syntax, but JSON is text only.
Code for reading and generating JSON data can be written in any programming language.
Kerberos |
|
a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology. Kerberos is available in many commercial products as well.
Kerberos was created by MIT as a solution to these network security problems. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server has used Kerberos to prove their identity, they can also encrypt all of their communications to assure privacy and data integrity as they go about their business.
https://web.mit.edu/kerberos/
KVM |
kernel-based VM
|
Linux
(Kernel-based VM) Is a virtualization module in the Linux kernel allowing the kernel to function as a hypervisor.
Laravel |
|
open-source PHP-based web framework for building web applications
LCAP |
link aggregation control protocol
|
networking
industry-standard protocol defined by the IEEE as part of the IEEE 802.3ad standard (now known as 802.1AX. Cisco's own proprietary protocol for link aggregation is called PAgP (Port Aggregation Protocol))
localStorage |
|
web
As part of the web storage API in web browsers, localStorage works similarly to cookies. However, it can store a larger amount of data. The storage available in Google Chrome is 5 MB maximum per domain, while Opera’s localStorage holds 3 MB but can be increased.
Because the internet may not be consistently accessible everywhere, localStorage enables you to take your work offline, just like with Wordle.
You can also store the state of your web page, even though HTTP is stateless. Say you only wanted to use the Solarized Dark theme on the Alligator.io site. Using localStorage, you wouldn’t have to change the theme every time you reopen the browser and visit the site.
https://www.meticulous.ai/blog/localstorage-complete-guide
LockBit |
|
a cybercriminal group proposing ransomware as a service (RaaS). According to a joint statement by various government agencies, LockBit was the world's most prolific ransomware in 2022. Following a law enforcement crackdown on the LockBit ransomware operation, cybercriminals recently announced the release of LockBit 5.0. Trend Micro researchers have analyzed LockBit 5.0, including the Windows, Linux and ESXi variants of the ransomware. The security firm noted that the new variants use randomized 16-character file extensions, are configured to avoid Russian-language systems, and clear event logs after encryption.
https://en.wikipedia.org/wiki/LockBit
MAPI |
message application programming interface
|
API for Microsoft Windows which allows programs to become email-aware.
Markdown |
.md, .markdown
|
a lightweight markup language for creating formatted text using a plain-text editor. People use it to create websites, documents, notes, books, presentations, email messages, and technical documentation. When you write in Markdown, the text is stored in a plaintext file that has an .md or .markdown extension. Markdown applications use something called a Markdown processor (also commonly referred to as a “parser” or an “implementation”) to take the Markdown-formatted text and output it to HTML format.
https://www.markdownguide.org/getting-started/
mempool |
|
blockchain
A mempool, an in-memory data structure within Ethereum or Bitcoin nodes, holds pending transactions awaiting inclusion in a block. This "waiting area" ensures transactions meet basic requirements and broadcasts them to other nodes. The mempool role is critical for transaction ordering, fee prioritization, and block construction, influencing blockchain operations. Though fundamental to blockchains, the mempool significance is often overlooked.
MIME |
Multipurpose Internet Mail Extension
|
a standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs. Message bodies may consist of multiple parts, and header information may be specified in non-ASCII character sets. Email messages with MIME formatting are typically transmitted with standard protocols, such as the Simple Mail Transfer Protocol (SMTP), the Post Office Protocol (POP), and the Internet Message Access Protocol (IMAP).
A multipart/mixed MIME message is composed of a mix of different data types. Each body part is delineated by a boundary. The boundary parameter is a text string used to delineate one part of the message body from another. All boundaries start with two hyphens (--). The final boundary also concludes with two hyphens (--). The boundary can be made up of any ASCII character except for a space, a control character, or special characters.
When Exchange Server sends MIME messages, the content-type depends on whether there are attachments to the message, and on the formatting of the message text. If there are attachments, the content-type is multipart/mixed. In this case, the message text and each attachment become a separate part of the message content, each with its own content-type. If there are no attachments, the content-type of the message is Text/Plain, and the message body is made up of only one part.
https://learn.microsoft.com/en-us/troubleshoot/exchange/administration/multipart-mixed-mime-message-format
MITRE |
|
The Mitre Corporation (stylized as The MITRE Corporation and MITRE) is an American not-for-profit organization with dual headquarters in Bedford, Massachusetts, and McLean, Virginia. It manages federally funded research and development centers (FFRDCs) supporting various U.S. government agencies in the aviation, defense, healthcare, homeland security, and cybersecurity fields, among others
https://en.wikipedia.org/wiki/Mitre_Corporation
MongoDB |
|
monorepo |
aka- Build System
|
programming
is a single repository containing multiple distinct projects, with well-defined relationships. Consider a repository with several projects in it. We definitely have “code colocation”, but if there are no well defined relationships among them, we would not call it a monorepo. "monolithic repository"
https://monorepo.tools/
MPLS |
Mutliprotocol Label Switching
|
networking
a data-forwarding technology in large networks that uses labels to route traffic more efficiently than traditional IP routing, enabling features like guaranteed Quality of Service (QoS) and reliable VPNs.
msi |
|
files
a standardized database file specifically designed for software installations using the Windows Installer Service
MySQL |
|
node.JS |
|
allows JavaScript to be used for backend development, including building web servers, APIs (like RESTful and GraphQL), and microservices. node.
JS frameworks include express, fastify, adonisJS
NoSQL |
|
designed to handle unstructured or semi-structured data and can be more flexible than relational databases
npm |
|
npm is the worlds largest software registry, a package manager for the JavaScript programming language maintained by npm, Inc., a subsidiary of GitHub. npm is the default package manager for the JavaScript runtime environment Node.js and is included as a recommended feature in the Node.js installer.
https://docs.npmjs.com/
NTIA |
National Telecommunicaitons and Information Administration
|
Formed 1978; 47 years ago - a bureau of the United States Department of Commerce that serves as the president's principal adviser on telecommunications policies pertaining to the United States' economic and technological advancement and to regulation of the telecommunications industry.
The Office of Policy Analysis and Development (OPAD) is the domestic policy division of the NTIA.
The Office of International Affairs (OIA) is responsible for developing and the implementation of policies to strengthen U.S. companies' ability to compete worldwide in both the Information Technology and Communications sectors.
The Institute for Telecommunication Sciences (ITS) is the research and engineering laboratory of the NTIA. ITS provides technical support to NTIA by further advancing telecommunications and information infrastructure development, strengthening domestic competition, enhancing U.S. telecommunications trade deals, as well as promoting a more effective use of the radio spectrum. Additionally, ITS serves as a key federal appliance in investigating the current telecommunications’ challenges of other federal agencies, state and local governments, private corporations and associations, and international organizations.
The Office of Internet Connectivity and Growth (OICG), formerly known as The Office of Telecommunications and Information Applications or OITA, collaborates public and non-profit entities in productively using telecommunications and information technologies to complete national goals in addition to adequately providing public services. The OICG is also currently administering programs that are helping people switch to digital television, the Broadband Technology Opportunity Program (BTOP), and Public Safety Interoperable Communications (PSIC) Grant Program.
The NTIA's Office of Spectrum Management is in charge of regulating use of spectrum allocated to the federal government. It serves in a manner equivalent to the Federal Communications Commission for this purpose.
https://en.wikipedia.org/wiki/National_Telecommunications_and_Information_Administration
Okta |
|
provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, websites, web services, and devices. Okta's services are built on the Amazon Web Services cloud
openSSL |
|
Open Source Toolkit for the TLS (formerly SSL), DTLS and QUIC protocols.
https://github.com/openssl/openssl
OSPF |
|
networking
Application layer, IP routing protocol utilizing LSR(link-state) algorithim. Operates within a single AS(autonomous system). It gathers link state information from available routers and constructs a topology map of the network. The topology is presented as a routing table to the internet layer for routing packets by their destination IP address.
OWASP |
Open WorldWide Application Secuirty Project
|
works to improve the security of software through its community-led open source software projects, hundreds of chapters worldwide, tens of thousands of members, and by hosting local and global conferences.
https://owasp.org/about/
package manager |
|
Windows- WinGet(command line), NuGet(.nupack,.nupkg | MacOS- Homebrew |Linux- APT,DNF,Pacman
Paradigm |
|
programming
A programming paradigm is a relatively high-level way to conceptualize and structure the implementation of a computer program. A programming language can be classified as supporting one or more paradigms. Paradigms are separated along and described by different dimensions of programming. Some paradigms are about implications of the execution model, such as allowing side effects, or whether the sequence of operations is defined by the execution model. Other paradigms are about the way code is organized, such as grouping into units that include both state and behavior. Yet others are about syntax and grammar.
Penguin Solutions |
|
designs, builds, deploys, and manages large, complex Al and high-performance computing (HPC) infrastructures at scale.
https://www.penguinsolutions.com/en-us
PGP |
pretty good privacy
|
Security
uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a username or an e-mail address
PIP |
|
python
standard package manager for python
Pixie Dust exploit |
|
The Pixie Dust exploit is not an isolated case but a
symptom of systemic issues in firmware supply chains, from weak
cryptography and poor entropy generation to opaque vendor patch
practices
The Pixie Dust exploit targets weaknesses in the Wi-Fi Protected Setup (WPS) protocol, exploiting poor entropy in key generation. An exploiter only needs to capture a single exchange while in wireless range. The brute force of the WPS PIN occurs offline and can be completed in 1–2 seconds. This bypasses password complexity entirely, making it a highly efficient exploit vector.
https://www.netrise.io/hubfs/Pixie-Dust-Report.pdf
POST |
php method
|
programming
The POST method is one of the fundamental HTTP request methods used in web communication. It is primarily designed for sending data to a server to create or update a resource. The core purpose of the POST method is to transmit data from a client (e.g., a web browser) to a server. This data is enclosed within the body of the HTTP request, rather than in the URL.
Post-quantum cryptography |
|
Cryptography currently thought to be secure against possible attack by a quantum computer.
If a quantum computer with a sufficient number of qubits could operate without succumbing to quantum noise and other quantum-decoherence phenomena, then Shor's algorithm could be used to break public-key cryptography schemes, such as
The RSA scheme
The finite-field Diffie–Hellman key exchange
The elliptic-curve Diffie–Hellman key exchange
PostgreSQL |
|
PowerBI |
|
data visualization software product developed by Microsoft with a primary focus on business intelligence (BI). Data may be input by reading directly from a database, webpage, PDF, or structured files such as spreadsheets, CSV, XML, JSON,[8] XLSX, and SharePoint
PRL |
protocol-relative URL
|
A protocol-relative URL (PRURL) is the method for linking to a website that offers both HTTP and HTTPS, while HTTPS links should be used for HTTPS-only websites and HTTP links should be used for sites that don't support HTTPS at all.
Used Because of performance. Establishing of HTTPS connection takes much longer time than HTTP, TLS handshake adds latency delay up to 2 RTTs. You can notice it on mobile networks. So it is better not to use HTTPS asset URLs, if you don't need it.
https://stackoverflow.com/questions/28446314/why-use-protocol-relative-urls-at-all
Proxmox |
|
Linux
is an open-source virtualization platform, allowing deployment and managment of vm’s and containers
pyPI |
|
A repository for python. Package authors use it to distribute their code. Approx 1mil users and 15mil files
https://pypi.org
pytype |
python
|
A static type analyzer for Python code
https://google.github.io/pytype/user_guide.html
Quantum computing |
|
Quantum computers are not yet practical for real-world applications. Physically engineering high-quality qubits has proven to be challenging. If a physical qubit is not sufficiently isolated from its environment, it suffers from quantum decoherence, introducing noise into calculations. National governments have invested heavily in experimental research aimed at developing scalable qubits with longer coherence times and lower error rates. Example implementations include superconductors (which isolate an electrical current by eliminating electrical resistance) and ion traps (which confine a single atomic particle using electromagnetic fields). Researchers have claimed, and are widely believed to be correct, that certain quantum devices can outperform classical computers on narrowly defined tasks, a milestone referred to as quantum advantage or quantum supremacy. These tasks are not necessarily useful for real-world applications.
https://www.youtube.com/watch?v=tsbCSkvHhMo
QUIC |
transport layer
|
IP Suite
QUIC improves performance of connection-oriented web applications that previously relied on Transmission Control Protocol (TCP). [2][9] It does this by establishing a number of multiplexed connections between two endpoints using User Datagram Protocol (UDP), and it is designed to obsolete TCP at the transport layer for many applications. Although its name was initially proposed as an acronym for Quick UDP Internet Connections, in IETF's use of the word QUIC is not an acronym; it is simply the name of the protocol.
Raster vs Vector
|
|
files
Vector images are built from mathematical paths, allowing them to be scaled infinitely without losing quality, making them ideal for logos and print designs, while raster images are made of pixels (like digital photos) and become pixelated when scaled up. Key differences include scalability, resolution dependency, file size, detail capabilities, and common file formats
React |
front-end frameworks
|
programming
A JavaScript library for building user interfaces, maintained by Facebook. It allows developers to create reusable UI components.
REDCap |
|
A secure web application for building and managing online surveys and databases. While REDCap can be used to collect virtually any type of data in any environment (including compliance with 21 CFR Part 11, FISMA, HIPAA, and GDPR), it is specifically geared to support online and offline data capture for research studies and operations.
https://project-redcap.org/
Reflective Code Loading |
|
eflectively loaded payloads may be compiled binaries, anonymous files (only present in RAM), or just snubs of fileless executable code (ex: position-independent shellcode).[1][2][3][4][5] For example, the Assembly.Load() method executed by PowerShell may be abused to load raw code into the running process.
https://attack.mitre.org/techniques/T1620/
regex |
regular expressions
|
programming
Parses text to identify patterns. Very often you'll have formatted data in some manner. Things with predictable names. Coordinates like "(382.4, 9191)" or identifiers with meaningful parts like "us-server-382". You may want an application that can strip out the individual parts and validate that the input was what we expected. Doing this without regular expressions is certainly possible, but it takes more code. Then again, regex is tricky to get right. For example, I probably got mine at least somewhat wrong. That's the reason for this famous Jamie Zawinski quote: "Some people, when confronted with a problem, think 'I know, I'll use regular expressions.' Now they have two problems."
https://www.reddit.com/r/learnprogramming/comments/y95lda/what_exactly_is_regex_used_for/
robots.txt |
|
the filename used for implementing the Robots Exclusion Protocol, a standard used by websites to indicate to visiting web crawlers and other web robots which portions of the website they are allowed to visit
Run-only |
|
programming
Normally, when you open a script in Script Editor, it ignores the compiled version and just opens the source. When you save, it compiles the source and saves both versions. "Run-only" means that you are only saving the compiled version, so there's no human-readable version anymore.
https://apple.stackexchange.com/questions/267675/what-does-the-run-only-checkbox-do-in-the-script-editor
S1ngularity incident |
|
An attacker compromised an npm publishing token for nx packages via a vulnerable GitHub Action. They abused that access to distribute new, malicious versions of a variety of Nx packages. The end result was thousands of corporate secrets leaked publicly across GitHub, enabling follow on attacks.
The malware directly extracted environment variables, as well as GitHub and npm tokens, and published them in public s1ngularity-repository GitHub repositories. The malware also abused locally configured AI CLIs to identify additional files for exfiltration. While GitHub eventually disabled these repositories, there was a sufficient window to retrieve the files.
https://nx.dev/blog/s1ngularity-postmortem
SAASes |
software a service, PLURAL
|
Samba |
|
Linux
free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell. Samba provides file and print services for various Microsoft Windows clients[5] and can integrate with a Microsoft Windows Server domain, either as a Domain Controller (DC) or as a domain member. As of version 4, it supports Active Directory and Microsoft Windows NT domains.
SAML |
security assertion markup language
|
an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions). SAML is also:
A set of XML-based protocol messages
A set of protocol message bindings
A set of profiles (utilizing all of the above)
An important use case that SAML addresses is web-browser single sign-on (SSO). Single sign-on is relatively easy to accomplish within a security domain (using cookies, for example) but extending SSO across security domains is more difficult and resulted in the proliferation of non-interoperable proprietary technologies. The SAML Web Browser SSO profile was specified and standardized to promote interoperability. In practice, SAML SSO is most commonly used for authentication into cloud-based business software.
https://en.wikipedia.org/wiki/Security_Assertion_Markup_Language
SBOM |
Software Bill of Materials
|
a list of all the open source and third-party components present in a codebase. An SBOM also lists the licenses that govern those components, the versions of the components used in the codebase, and their patch status, which allows security teams to quickly identify any associated security or license risks.
https://www.blackduck.com/blog/software-bill-of-materials-bom.html
Scattered Spider |
aka ALPHAV
|
security
Attacked MGM and Ceasar's casinos in 2023. They encrypted approximately 100 ESXi hypervisors within MGM’s network. These servers hosted thousands of virtual machines that supported critical hospitality systems such as gaming machines, online reservation systems, digital room keys and websites. ALPHV also claims to have exfiltrated 6 TB of customer information during this time, upon which they initiated negotiations with MGM to prevent the public release of the stolen data. ALPHV also threatened to disclose the exfiltrated information if an agreement could not be reached.
https://blog.netwrix.com/mgm-cyber-attack
SEO |
search engine optimization
|
the process of improving the quality and quantity of website traffic to a website or a web page from search engines
serialization |
|
programming
the process of translating a data structure or object state into a format that can be stored (e.g. files in secondary storage devices, data buffers in primary storage devices) or transmitted (e.g. data streams over computer networks) and reconstructed later (possibly in a different computer environment) -- Uses of serialization include:
serializing data for transfer across wires and networks (messaging).
storing data (in databases, on hard disk drives).
remote procedure calls, e.g., as in SOAP.
distributing objects, especially in component-based software engineering such as COM, CORBA, etc.
detecting changes in time-varying data.
ServiceNow |
|
American software company based in Santa Clara, California, that supplies a cloud computing platform for the creation and management of automated business workflows. Designed to support IT service management and help desk functionality with automated workflows. Their fee model was based on a cost per user (seat) per month, with that cost ranging down from US$100
shell script |
|
designed to be run by a Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be command languages. Typical operations performed by shell scripts include file manipulation, program execution, and printing text. A script which sets up the environment, runs the program, and does any necessary cleanup or logging, is called a wrapper.
SMB |
server mesage block
|
communication protocol[1] used to share files, printers, serial ports, and miscellaneous communications between nodes on a network.
SPSS |
Statistical Package for the Social Sciences
|
Application by IBM used for managing, analyzing, and visualizing data to uncover insights in fields like social sciences, healthcare, and business
ssh |
secure shell
|
security
1234
Switched fabric |
|
a network topology in which network nodes interconnect via one or more network switches[1] (particularly crossbar switches). It REQUIRES switches, unlike point-to-point or arbitrated loop, the other mehtods of FC.
Multiple switches in a fabric usually form a mesh network, with devices being on the "edges" ("leaves") of the mesh. Most Fibre Channel network designs employ two separate fabrics for redundancy. The two fabrics share the edge nodes (devices), but are otherwise unconnected.
The fabric topology allows the connection of up to the theoretical maximum of about 16 million devices, limited only by the available address space (2^24).
Sys Admin |
|
manages IT infrastructure and daily operations, focusing on system uptime, stability, and maintenance.
TTP |
tactics, techniques, procedures
|
The behavior of an actor. A tactic is the highest-level description of this behavior, while techniques give a more detailed description of behavior in the context of a tactic, and procedures an even lower-level, highly detailed description in the context of a technique.
https://csrc.nist.gov/glossary/term/tactics_techniques_and_procedures
Typosquatting |
domains, package mangers
|
Typosquatting in package managers is a sophisticated form of supply chain attack where cybercriminals create malicious packages with names that closely mimic popular, legitimate packages. The attack relies on a simple premise: developers will occasionally mistype package names when installing dependencies, inadvertently downloading malicious code instead of the intended library.
The concept mirrors domain typosquatting, where attackers register misspelled versions of popular websites. However, in the context of package managers like npm (Node.js), PyPI (Python), and RubyGems (Ruby), the stakes are considerably higher. Unlike accidentally visiting a wrong website, installing a malicious package can grant attackers immediate access to your development environment, source code, and potentially your entire infrastructure.
Common Typo Patterns: Research shows that certain typing errors are more common than others. Attackers exploit patterns like: - Transposed letters (teh instead of the) - Missing letters (nmap instead of nump) - Additional letters (requet instead of request) - Substituted characters (pupeteer instead of puppeteer)
https://instatunnel.my/blog/typosquatting-in-package-managers-the-attack-that-preys-on-a-single-keystroke
V8 |
JavaScript engine
|
Google created V8 for its Chrome browser, and both were first released in 2008. The lead developer of V8 was Lars Bak, and it was named after the powerful car engine. For several years, Chrome was faster than other browsers at executing JavaScript
https://en.wikipedia.org/wiki/V8_(JavaScript_engine)
vishing |
voice phishing
|
fraudulent phone calls or voice messages designed to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details. These details can then be exploited for criminal activities such as fraud, identity theft, or financial theft. Phishing attacks are common and costly: In 2022, phishing was the second most-common cause of data breaches, costing organizations an average of US$4.91 million in breach expenses.
In vishing scams, attackers pretend to be from reputable organizations (such as the victim's bank, the IRS, or a package delivery service) and make unexpected phone calls. They might use toll-free numbers or use voice over internet protocol (VoIP) technology to appear as trusted organizations.
However, these attacks aren't limited to phone calls. Many vishing attacks start with a phishing email, urging the recipient to dial a number. Once in a call, scammers use social engineering tactics to convince the target to share their personal details.
https://www.cisco.com/site/us/en/learn/topics/security/what-is-vishing.html#:~:text=and%20phone%20scams?-,What%20is%20the%20definition%20of%20vishing?,recipient%20to%20dial%20a%20number.
Vue.js |
front-end frameworks
|
programming
A progressive JavaScript framework that is approachable yet powerful, making it easy to integrate with other libraries or existing projects.
Wasm |
WebAssembly
|
WASM is binary code while JS is more high level text code. WASM directly runs on machine and can be twice as fast compared to JavaScript. WASM is pre-compiled. Was initially designed to permit near-native code execution speed in the web browser, it has been considered valuable outside of such, in more generalized contexts.
Browsers can only run JavaScript, historically. Now they can run JavaScript and WASM*.
JavaScript is a high level (more abstracted away from the "machine") language. This means browser engines have to go through steps to do anything with it (parse -> compile & optimize based on assumptions -> re-optimize if assumptions were wrong -> execute).
WASM is not a language in itself, it's a bytecode format (not human readable), much like java, which is basically much more machine readable much more quickly.
Instead of the client receiving javascript code and compiling it and optimizing it before it can be run, WASM is received in the format that it needs to run and in much less space, while also being significantly faster because it's not interpreted. I believe every browser is now shipped with a WASM Virtual Machine which runs this bytecode.
https://www.reddit.com/r/WebAssembly/comments/jhu96m/how_does_it_actually_work/
weakly typed |
|
javascript
some types are implicitly cast, depending on the context.
Web3 |
|
a proposed next stage of the internet that uses blockchain technology to create a decentralized, user-owned internet, shifting power from large tech companies to individuals. Key components include blockchains, smart contracts, and decentralized applications (dApps).
WebSocket protocol |
|
WebSocket is distinct from HTTP used to serve most webpages. Although they are different, RFC 6455 states that WebSocket "is designed to work over HTTP ports 443 and 80 as well as to support HTTP proxies and intermediaries", making the WebSocket protocol compatible with HTTP. To achieve compatibility, the WebSocket handshake uses the HTTP Upgrade header to change from the HTTP protocol to the WebSocket protocol.
The WebSocket protocol enables full-duplex interaction between a web browser (or other client application) and a web server with lower overhead than half-duplex alternatives such as HTTP polling, facilitating real-time data transfer from and to the server. This is achieved by providing a standardized way for the server to send content to the client without being first requested by the client, and allowing messages to be exchanged while keeping the connection open. In this way, a two-way ongoing conversation can take place between the client and the server. The communications are usually done over TCP port number 443 (or 80 in the case of unsecured connections), which is beneficial for environments that block non-web Internet connections using a firewall.
https://en.wikipedia.org/wiki/WebSocket
Wikimedia REST API |
|
provides cacheable and straightforward access to Wikimedia content and data, in machine-readable formats. lets you interact with MediaWiki by sending HTTP requests to rest.php URLs
https://wikimedia.org/api/rest_v1/
wikipediaAPI |
|
Python library with methods for extracting texts, sections, links, categories, and translations from Wikipedia.
https://pypi.org/project/Wikipedia-API/
X.509 |
|
Security
International Telecommunication Union (ITU) standard defining the format of public key certificates. X.509 certificates are digital documents that represent a user, computer, service, or device. A certificate authority (CA), subordinate CA, or registration authority issues X.509 certificates. The certificates contain the public key of the certificate subject. They don't contain the subject's private key, which must be stored securely.
https://learn.microsoft.com/en-us/azure/iot-hub/reference-x509-certificates
xampp |
|
linux
Apache distribution containing MariaDB, PHP, and Perl
Xcode |
|
programming
A suite of developer tools for MacOS applications. Supports source code for the programming languages: Swift, C++, Objective-C, Objective-C++, Java, AppleScript, Python, Ruby, ResEdit (Rez), and C.
Xcode can build fat binary (universal binary) files containing code for multiple architectures with the Mach-O executable format. These helped ease the transitions from 32-bit PowerPC to 64-bit PowerPC, from PowerPC to Intel x86, from 32-bit to 64-bit Intel, and most recently from Intel x86 to Apple silicon by allowing developers to distribute a single application to users and letting the operating system automatically choose the appropriate architecture at runtime
https://en.wikipedia.org/wiki/Xcode
XCSSET |
|
malware
The XCSSET Malware: Inserts Malicious Code Into Apple Xcode Projects, Performs UXSS Backdoor Planting in Safari,and Leverages Two Zero-day Exploits
https://www.trendmicro.com/en_us/research/20/h/xcsset-mac-malware--infects-xcode-projects--uses-0-days.html
XLAM |
|
A file with the XLAM file extension is an Excel Macro-Enabled Add-In file that's used to add new functions to Excel. Similar to other spreadsheet file formats, XLAM files contain cells that are divided into rows and columns that can contain text, formulas, charts, images, and more. Like Excel's XLSM and XLSX file formats, XLAM files are XML-based and saved with ZIP compression to reduce the overall size. Along with cybercrime groups, APTs like transparent tribe have been found leveraging .xlam file types to target their victims.
https://filesec.io/xlam
Zero Trust |
|
A Zero Trust approach should extend throughout the entire organization and serve as an integrated security philosophy and end-to-end strategy.
'trust by exception' vs 'trust by default'
- Verify Explicitly, always authenticate and authorise based on all available data points
- Use leas privilege access vis JustIInTime and JustEnoughAccess
- Assuume breach will occur, minimize segment access, verify end-to-end encryption.
Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to "never trust, always verify."
https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-overview
---end SQL query output---
designing this page