Configuração incorreta
A deliberate configuration change within a system by a malicious actor, typically to create back-door access or exfiltrate information. While the original change in configuration might involve a compromised account or other vulnerability, a malconfiguration has the benefit of offering long term access using legitimate tools, without further need of a password or after a vulnerability is closed.
Obtenha visibilidade completa
com nossa Avaliação de Risco de Dados.
Obrigado! Seu envio foi recebido!
Ops! Ocorreu um erro ao enviar o formulário.