about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo

Jay ZDLin

TranslationsNotesQuestions
Jay ZDLinadded translation 8 дней назад
translation (en-ru)

dangling markup injection

внедрение незавершенной разметки

Translator's comment

Dangling Markup refers to unclosed or partially completed HTML tags within a web page’s code. Cyberattackers exploit this vulnerability to inject malicious code into a site, often exposing sensitive data or enabling unauthorized actions.

Example: <input type="text" name="input" value="CONTROLLABLE DATA HERE

#Information technology and telecommunications
Jay ZDLinadded translation 21 день назад
translation (en-ru)

sandbox escape

побег из песочницы

Translator's comment

1) Побег из песочницы (Sandbox Escape) это техника, которую злоумышленники используют для обхода механизмов безопасности, которые предназначены для защиты компьютера.

2) Побег из песочницы результат эксплуатации уязвимостей, позволяющих из изолированной среды песочницы выполнить вредоносный код за ее пределами.

#Information technology and telecommunications
Jay ZDLinadded translation месяц назад
translation (en-ru)

behavioral detection

поведенческое обнаружение, обнаружение на основе поведенческого анализа

#Information technology and telecommunications
Jay ZDLinadded translation месяц назад
translation (en-ru)

IOC

сокр. от indicator of compromise/ индикатор компрометации

#Information technology and telecommunications
Jay ZDLinadded translation месяц назад
translation (en-ru)

indicator of compromise

индикатор компрометации

Translator's comment

An indicator of compromise (IOC) is evidence that someone may have breached an organization’s network or endpoint.

#Information technology and telecommunications
Jay ZDLinadded translation месяц назад
translation (en-ru)

command injection

внедрение команды, внедрение команд

#Information technology and telecommunications
Jay ZDLinadded translation месяц назад
translation (en-ru)

if you pay peanuts, you get monkeys

как оплачено, так и наработано

Translator's comment

if an employer pays very low wages, they cannot expect to find good staff

Jay ZDLinadded translation месяц назад
translation (en-ru)

lateral movement

перемещении внутри периметра

Translator's comment

The adversary is trying to move through your environment.

Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it.

Noun;
#Information technology and telecommunications
Jay ZDLinadded translation месяц назад
translation (en-ru)

rogue

поддельный

Example

rogue domain controller

Example translation

поддельный контроллер домена

Adjective;
#Information technology and telecommunications
Jay ZDLinadded translation месяц назад
translation (en-ru)

cache poisoning

отравление кэша

Translator's comment

Cache poisoning refers to a computer security vulnerability where invalid entries can be placed into a cache, which are then assumed to be valid when later used.

#Information technology and telecommunications
Show more