Network-Security
CVE-2026-20127 — Cisco Catalyst SD-WAN Authentication Bypass
Technical analysis of CVE-2026-20127, the critical Cisco Catalyst SD-WAN authentication bypass vulnerability that allows unauthenticated remote attackers to obtain administrative privileges on exposed management systems.
Command and Control (C2) — Remote Communication Channel for Compromised Systems
Command and Control (C2) refers to the infrastructure and communication mechanisms attackers use to remotely manage compromised systems. This SECMONS glossary entry explains how C2 works, common techniques, and how defenders detect and disrupt malicious control channels.
Data Exfiltration — Unauthorized Transfer of Sensitive Information
Data Exfiltration is the stage of an intrusion where attackers extract sensitive information from a compromised environment. This SECMONS glossary entry explains how data exfiltration works, common techniques, operational impact, and defensive detection strategies.
Denial of Service (DoS) — Disrupting Availability Through Resource Exhaustion
Denial of Service (DoS) is an attack that disrupts the availability of a system, service, or network by exhausting resources or triggering crashes. This SECMONS glossary entry explains how DoS works, how it differs from Distributed Denial of Service (DDoS), and how defenders should approach mitigation.
Man-in-the-Middle (MitM) — Intercepting and Manipulating Communications in Transit
A Man-in-the-Middle (MitM) attack occurs when an attacker intercepts, monitors, or alters communication between two parties without their knowledge. This SECMONS glossary entry explains how MitM attacks work, common techniques, real-world impact, and how defenders should mitigate interception risks.
Modern DDoS Attack Techniques: Strategic Analysis
Analytical research on modern DDoS attack techniques, including protocol abuse, botnet orchestration, application-layer flooding, and the operational shifts shaping today’s disruption campaigns.
Secure Access Service Edge (SASE)
Secure Access Service Edge (SASE) is a cloud-delivered cybersecurity architecture that combines networking and security services into a unified platform to provide secure access to applications, users, and devices regardless of location.
Network Detection and Response (NDR)
Network Detection and Response (NDR) is a cybersecurity technology that monitors network traffic to detect suspicious behavior, identify threats, and support investigation and response to malicious activity within enterprise environments.
Secure Web Gateway (SWG)
A Secure Web Gateway (SWG) is a cybersecurity control that monitors and filters web traffic to protect users and systems from malicious websites, malware downloads, and data exfiltration.
Beaconing
Beaconing is a network communication pattern used by malware and attackers where compromised systems periodically connect to command-and-control infrastructure to receive instructions or transmit data.
DNS Tunneling
DNS Tunneling is a technique that abuses the Domain Name System protocol to covertly transmit data between a compromised system and attacker infrastructure, often bypassing network security controls.