A curated glossary that provides definitions and explanations for cybersecurity acronyms and terminology used across the industry, open source projects, and non-profit organizations. The resource organizes cybersecurity terms into logical categories to help users understand technical concepts beyond surface-level buzzwords. It covers various domains including encryption algorithms, attack methodologies, vulnerabilities, and threat classifications. The glossary includes explanations for common encryption standards like AES, DES, and RSA, as well as attack vectors such as CSRF, DoS/DDoS, and MITM attacks. It also defines malware categories, vulnerability types, and modern threat concepts like Ransomware as a Service (RaaS). The project accepts community contributions to expand and maintain the accuracy of cybersecurity terminology definitions. This makes it a collaborative resource for security professionals, students, and anyone seeking to understand cybersecurity language and concepts.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.