ReversingLabs Glossary
A
Application Security Posture Management
Application security testing (AST)
Artifact Repository
Attack surface
Attack vector
C
Binary Analysis
CBOM
Code obfuscation
Code Scanning
Code Signing
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Scoring System (CVSS)
Container Security
Continuous Monitoring
Cyber Risk Assessment
Cyber Security Threat hunting
Cyber-risk mitigation
Cybersecurity Supply Chain Risk Management (C-SCRM)
D
Dependency Management
DevSecOps
Digital forensics and incident response (DFIR)
DLL sideloading
Dynamic application security testing (DAST)
I
Incident Response Plan
Indicator of compromise (IoC)
Insider threat
Interactive application security testing (IAST)
K
Keylogger
M
Malware
Malware analysis
N
npm
O
Open Software Supply Chain Attack Reference (OSC&R)
R
Patch Management
P
Payload
Phishing
R
Ransomware
Remote access Trojan (RAT)
Reverse engineering
Rootkit
S
SaaSBOM
Secrets
Secure Software Development Framework (SSDF)
Security Automation
Security operations center (SOC)
Smishing attack
Software assurance
Software Assurance Foundational Evaluation (SAFE)
Software Bill of Materials (SBOM)
Software component verification standard (SCVS)
Software composition analysis (SCA)
Software development lifecycle (SDLC)
Software supply chain security
Software tampering
Software vulnerabilities
Spyware
SQL injection
Static analysis
Static application security testing (SAST)
Supply chain integrity attacks
Supply-chain Levels for Software Artifacts (SLSA)
T
Third party cyber risk management (TCPRM)
Threat actor
Threat intelligence
Threat modeling
Trojan
Typosquatting
X
xBOM
Y
YARA rules
Z
Zero-day attack

Ready to get started?

Contact us for a personalized demo