Cybersecurity Glossary

1506 essential cybersecurity terms explained. Your reference guide from A to Z.

1506Terms
A–ZIndexed
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
U
UDP
User Datagram Protocol. A connectionless transport protocol that sends data without establishing a connection, offering speed at the cost of reliability.
USB Drop Attack
A social engineering technique where malicious USB devices are left in public places, exploiting curiosity to install malware when plugged into computers.
UART
Universal Asynchronous Receiver-Transmitter. A serial communication protocol often exposed on IoT device debug headers, providing console access for analysis.
URL Rewriting
An email security technique that modifies links in emails to route through a security service that scans the destination for threats at click time.
Union-Based SQL Injection
A SQL injection technique that uses the UNION SQL operator to combine results from the injected query with the original query.
UAC Bypass
Techniques for circumventing Windows User Account Control to execute programs with elevated privileges without triggering a UAC prompt.
UEFI Rootkit
Malware that infects the Unified Extensible Firmware Interface, persisting below the operating system and surviving disk replacement.
USB Attack
Attacks delivered through USB devices including rubber duckies, USB killers, rogue charging cables, and infected flash drives.
Unvalidated Redirect
A vulnerability where an application accepts untrusted input that causes redirection to an external URL without validation.
Use After Free
A memory corruption vulnerability where a program continues to use a pointer after the memory it references has been freed.