A protocol for organizing virtual private networks (VPNs). It provides traffic tunneling in networks based on IP, X.25, Frame Relay, and ATM technologies. Unlike other VPN specifications, L2TP does not have its own means of data encryption, and is often… Read Full Article

A landing page is a website that receives traffic from an online ad. Landing pages are usually specially created resources tied to an advertised product or service. The purpose of the landing page is to persuade the visitor to perform… Read Full Article

Lateral movement refers to the techniques used by attackers to advance through a network after penetrating the corporate infrastructure. Read Full Article

An open, cross-platform protocol for accessing directory services. It is most often used to interact with a directory server containing account information; however, the hierarchical structure of the database allows any data to be stored. LDAP is a user authorization… Read Full Article

A Living off the Land (LotL) attack describes a cyberattack in which intruders use legitimate software and functions available in the system to perform malicious actions on it. Living off the land means surviving on what you can forage, hunt,… Read Full Article

Locker ransomware (aka locker or blocker) is malware that blocks access to a system, or part of it, and demands a ransom to restore it. Read Full Article

An electronic document or file that records all actions and events in a system in chronological order, as well as error messages and other incidents. It is used to analyze the operation of an object. Such object can be a… Read Full Article

A partition of permanent memory perceived by the operating system as a separate storage device. A single physical drive can contain several different-sized logical volumes with different security policies. For example, system software can be installed on one logical drive,… Read Full Article

A high-speed data transmission standard in GSM cellular networks. It is a development of EDGE, UMTS, and HSPA technologies. At first, LTE did not fully meet the requirements of the 3GPP consortium for 4G networks, but with the release of… Read Full Article