Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. CA certificateJan 06, 2026

    "A [digital] certificate for one CA issued by another CA." [X509]

  2. Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.

  3. CCMJan 06, 2026

    See: Counter with Cipher Block Chaining Message Authentication Code.

  4. obstructionJan 06, 2026

    A type of threat action that interrupts delivery of system services by hindering system operations. (See: disruption.)

  5. adversaryJan 06, 2026

    An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.

  6. An encapsulation syntax (RFC 3852) for digital signatures, hashes, and encryption of arbitrary messages.

  7. Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.

  8. SIM Card SwapJan 06, 2026

    Adversaries may gain access to mobile devices through transfers or swaps from victims’ phone numbers to adversary controlled SIM cards and mobile devices.(Citation: ATT SIM Swap Scams)(Citation: Verizon SIM Swapping)

  9. bastion hostJan 06, 2026

    A strongly protected computer that is in a network protected by a firewall (or is part of a firewall) and is the only host (or one of only a few) in the network that can be directly accessed from networks on the other side of the firewall. (See: firewall.)

  10. GeldKarteJan 06, 2026

    A smartcard based, electronic money system that is maintained by the German banking industry, incorporates cryptography, and can be used to make payments via the Internet. (See: IOTP.)

  11. "A top level specification that is written in a formal mathematical language to allow theorems showing the correspondence of the system specification to its formal requirements to be hypothesized and formally proven." [NCS04] (See: formal specification.)

  12. An adversary may encrypt files stored on a mobile device to prevent the user from accessing them. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.

  13. "Unclassified cryptographic equipment that embodies a U.S. Government classified cryptographic logic and is endorsed by NSA for the protection of national security information." [C4009] (Compare: CCI, type 2 product.)

  14. An integer value that (a) is associated with, and may be carried in, a digital certificate; (b) is assigned to the certificate by the certificate's issuer; and (c) is unique among all the certificates produced by that issuer.

  15. IETFJan 06, 2026

    See: Internet Engineering Task Force.

  16. An Internet protocol [R2560] used by a client to obtain from a server the validity status and other information about a digital certificate. (Mentioned in [X509] but not specified there.)

  17. A block cipher mode that enhances ECB mode by chaining together blocks of cipher text it produces. [FP081] (See: block cipher, [R1829], [R2405], [R2451], [SP38A].)

  18. CCIJan 06, 2026

    See: Controlled Cryptographic Item.

  19. "An oxymoron," said Lt. Gen. William H. Campbell, former U.S. Army chief information officer, speaking at an Armed Forces Communications and Electronics Association conference.

  20. The process of regaining a secure state for a system after detecting that the system has experienced a security compromise.

  21. See: Ina Jo.

  22. Adversaries may use an existing, legitimate external Web service channel as a means for sending commands to a compromised system without receiving return output. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service. Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response.

  23. cold startJan 06, 2026

    A procedure for initially keying cryptographic equipment. [C4009]

  24. IMAP4 AUTHENTICATEJan 06, 2026

    An IMAP4 command (better described as a transaction type, or subprotocol) by which an IMAP4 client optionally proposes a mechanism to an IMAP4 server to authenticate the client to the server and provide other security services. (See: POP3.)

  25. System FirmwareJan 06, 2026

    Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.(Citation: Wikipedia BIOS)(Citation: Wikipedia UEFI)(Citation: About UEFI)

  26. KLIFJan 06, 2026

    See: key loading and initialization facility.

  27. A mode of system operation wherein all users having access to the system have the necessary security clearance for the single, hierarchical classification level of all data handled by the system, but some users do not have the clearance for a non hierarchical category of some data handled by the system. (See: category, /system operation/ under "mode", protection level, security clearance.)

  28. intruderJan 06, 2026

    An entity that gains or attempts to gain access to a system or system resource without having authorization to do so. (See: intrusion. Compare: adversary, cracker, hacker.)

  29. cryptonetJan 06, 2026

    A network (i.e., a communicating set) of system entities that share a secret cryptographic key for a symmetric algorithm. (See: controlling authority.)

  30. guest loginJan 06, 2026

    See: anonymous login.

  31. Clipboard DataJan 06, 2026

    Adversaries may abuse clipboard manager APIs to obtain sensitive information copied to the device clipboard. For example, passwords being copied and pasted from a password manager application could be captured by a malicious application installed on the device.(Citation: Fahl Clipboard)

  32. OPSECJan 06, 2026

    Abbreviation for "operations security".

  33. Adversaries may forcibly restart or shutdown a device in an ICS environment to disrupt and potentially negatively impact physical processes. Methods of device restart and shutdown exist in some devices as built in, standard functionalities. These functionalities can be executed using interactive device web interfaces, CLIs, and network protocol commands.

  34. Computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data text, graphics, images, video, or audio and for detecting or extracting the marks later.

  35. FIRSTJan 06, 2026

    See: Forum of Incident Response and Security Teams.

  36. GCAJan 06, 2026

    See: geopolitical certificate authority.

  37. A language (ISO 8807 1990) for formal specification of computer network protocols; describes the order in which events occur.

  38. A TCP based, Application Layer, client server, Internet protocol (RFC 2616) that is used to carry data requests and responses in the World Wide Web. (See: hypertext.)

  39. Adversaries may automate collection of industrial environment information using tools or scripts. This automated collection may leverage native control protocols and tools available in the control systems environment. For example, the OPC protocol may be used to enumerate and gather information. Access to a system or interface with these native protocols may allow collection and enumeration of other attached, communicating servers and devices.

  40. System ChecksJan 06, 2026

    Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behavior after checking for the presence of artifacts indicative of a virtual environment or sandbox. If the adversary detects a virtual environment, they may alter their malware’s behavior to disengage from the victim or conceal the core functions of the implant. They may also search for virtualization artifacts before dropping secondary or additional payloads.

  41. SteganographyJan 06, 2026

    Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.

  42. hybrid encryptionJan 06, 2026

    An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption. Examples: digital envelope, MSP, PEM, PGP. (Compare: superencryption.)

  43. brandJan 06, 2026

    A distinctive mark or name that identifies a product or business entity.

  44. bit stringJan 06, 2026

    A sequence of bits, each of which is either "0" or "1".

  45. Internet SocietyJan 06, 2026

    A professional society concerned with Internet development (including technical Internet Standards); with how the Internet is and can be used; and with social, political, and technical issues that result. The ISOC Board of Trustees approves appointments to the IAB from among nominees submitted by the IETF nominating committee. (RFC 2026)

  46. Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications, such as pip and NPM packages, may be targeted as a means to add malicious code to users of the dependency.(Citation: Trendmicro NPM Compromise)(Citation: Bitdefender NPM Repositories Compromised 2021)(Citation: MANDVI Malicious npm and PyPI Packages Disguised) This may also include abandoned packages, which in some cases could be re registered by threat actors after being removed by adversaries.(Citation: The Hacker News PyPi Revival Hijack 2024) Adversaries may also employ "typosquatting" or name confusion by choosing names similar to existing popular libraries or packages in order to deceive a user.(Citation: Ahmed Backdoors in Python and NPM Packages)(Citation: Meyer PyPI Supply Chain Attack Uncovered)(Citation: Checkmarx oss seo)

  47. An algorithm independent transaction format (e.g., PKCS 10, RFC 4211) that contains a DN, and a public key or, optionally, a set of attributes, collectively signed by the entity requesting certification, and sent to a CA, which transforms the request to an X.509 public key certificate or another type of certificate.

  48. hypermediaJan 06, 2026

    A generalization of hypertext; any media that contain hyperlinks that point to material in the same or another data object.

  49. CBCJan 06, 2026

    See: cipher block chaining.

  50. A standard for describing data objects. [Larm, X680] (See: CMS.)