Cybersecurity Acronyms
Cybersecurity Acronyms & Describe link
APT - Advanced Persistent Threat
AP - access point
BAS - Breach and Attack Simulation
RCE - Remote Code Execution
How Does It Work: Injection Attacks, Deserialization Attacks, Out-of-Bounds Write
VA - Vulnerability Assessment
PT - Penetration test
NTLM - New Technology LAN Manager
UAF - Use-After-Free
Use-After-Free (UAF) is a vulnerability related to incorrect use of dynamic memory during program operation. If after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to hack the program.
AMSI - Antimalware Scan Interface
Last modified March 17, 2023: update (cdf1f69)