Educated Means Secured
Dive into clear explanations, expert insights, and real-world context. FYND Cyber helps you transform knowledge into your most reliable defense.
Currently covering 200 foundational definitions across the security lifecycle.
A
- Access Control
- Access Log Monitoring
- Account Enumeration
- Advanced Persistent Threat (APT)
- Affiliate Model (Cybercrime)
- Air Gap
- Amazon S3
- API Exposure
- API Mass Assignment Vulnerability
- API Misconfiguration
- API Rate Limiting Bypass
- API Schema Validation Failure
- API Security
- Attack Path Analysis
- Attack Surface
- Attack Surface Discovery
- Attack Surface Reduction (ASR)
- Authorization Bypass
- Azure Blob Storage
B
C
- Certificate Expiration Risk
- Certificate Pinning
- Certificate Transparency (CT) Logs
- Checkout Skimming (Magecart)
- Clickjacking
- Cloud Access Logging
- Cloud Asset Inventory
- Cloud IAM Misconfiguration
- Cloud Misconfiguration
- Cloud Privilege Escalation
- Cloud Service Enumeration
- Common Vulnerabilities and Exposures (CVE)
- Configuration Baseline
- Configuration Drift
- Containment Phase
- Content Security Policy (CSP)
- CORS Misconfiguration
- Credential Exposure Monitoring
- Credential Harvesting
- Credential Leakage
- Credential Reuse
- Credential Stuffing
- Cross-Site Request Forgery (CSRF)
- Cyber Essentials
D
- Dangling DNS Record
- Dark Web Exposure
- Data Breach
- Data Exfiltration Risk
- Data Exposure
- Data Residency
- Default Credentials
- Digital Certificate Chain
- Digital Footprint Exposure
- Directory Listing Exposure
- Distributed Denial of Service (DDoS)
- DNS Cache Poisoning
- DNS Configuration
- DNS Hijacking
- DNS over HTTPS (DoH)
- DNS Rebinding
- DNS Zone Transfer Exposure
- DNSSEC (Domain Name System Security Extensions)
- Domain Enumeration
- Domain Spoofing
E
F
I
M
O
P
R
S
- Secure API Gateways
- Security Baseline
- Security Control Framework
- Security Headers
- Security Information and Event Management (SIEM)
- Security Orchestration, Automation, and Response (SOAR)
- Server-Side Request Forgery (SSRF)
- Service Enumeration
- Session Fixation
- Session Hijacking
- Shadow IT
- SMB (Server Message Block — Port 445)
- SSH (Port 22)
- Stolen Credentials
- Subdomain
- Subdomain Takeover
- Supply Chain Attack
U
W
FYND Blog
Need real-world examples? Explore our blog.
Stay ahead of attackers with live breach coverage, expert analysis, and practical security fixes you can use today.
Read the blog