Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries with tag filters and quick sort.

  1. Updated Jan 05, 2026

    reflects the complexity of the attack required to exploit the software feature misuse vulnerability.

  2. Updated Jan 05, 2026

    reflects the access required to exploit the vulnerability.

  3. Updated Jan 06, 2026

    An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man in the middle (MitM), impersonation, and session hijacking.

  4. Updated Jan 03, 2026

    Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks, including conducting Reconnaissance, creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT AI)