Jargon Busters

Credential Stuffing

What is Credential Stuffing?

Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential stuffing is. Video transcript: When professionals mention credential stuffing attacks, what they are usually referring to is the process of brute-forcing username-password pairs into applications in order to get a valid login. For an attacker, this process can be automated …

What is Credential Stuffing? Read More »

What is Zero Trust

What is Zero Trust?

Zero Trust is simply a concept, a model which states that you really should not be trusting anyone or any device just because they reside on your network or within your perimeter. All networks should be considered untrusted and hostile, regardless of whether we are talking about a local network in a secure building or …

What is Zero Trust? Read More »

vulnerability assessments and penetration tests

Vulnerability Assessments vs Penetration Tests

Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security expert Thom sheds some light on Vulnerability Assessments, Penetrations Tests and the differences between them. “Vulnerability assessments typically rely on vulnerability scanning tools to identify technical vulnerabilities making use of pre-configured test cases and signatures. A penetration test takes a …

Vulnerability Assessments vs Penetration Tests Read More »

pass the hash


Ray answers: What is PASS the HASH? In this week’s edition of JUMPSEC’s Cyber Security Jargon Buster, Ray explains what PASS the HASH means. “To understand what PASS the HASH is, you first must understand what is a HASH. So generally speaking, for every input, such as a password, there’s one unique output, a HASH, …

PASS the HASH Read More »

What is a buffer overflow

What is buffer overflow?

Ray explains what Buffer Overflow means News broke this week describing how hackers were able to exploit a vulnerability in Facebook owned messaging platform ‘WhatsApp’ and target a select number of users, cited to most likely include lawyers, journalists, activists and human rights defenders. It was reported that a “buffer overflow” vulnerability was found in …

What is buffer overflow? Read More »

Scroll to Top