Skip navigation

An attack on a network that takes advantage of a vulnerability, compromising its integrity, availability, or confidentiality.


Want More Content Like This?

Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.