Compromised Web Applications

Glossary

In this attack scenario, criminals exploit website vulnerabilities. When the pages are accessed, the perpetrators have manipulated the applications used. This allows them to skim data or secretly forward visitors.

Related articles

  • Administrator

    In IT, the administrator manages computers, servers and networks, among other things, by setting them up and maintaining, updating, detecting and fixing system errors on them.

    mehr lesen
  • Botnets

    A bot is a computer program that automatically and independently performs certain tasks. If several bots connect with each other, a botnet is created.

    mehr lesen

Are you curious?

Test us for 30 days free of charge and without obligation.

We empower your employees to actively contribute to your company’s cybersecurity.

See for yourself how easily and quickly Perseus can be integrated into your corporate structure.

Test now for free

Do you have any questions about our services?

Do not hesitate to call: + 49 30 95 999 8080

  • Free trial period
  • Without obligation
  • Video training for cyber security and data protection with exam and certificate
  • Try our phishing simulation
  • IT security check, malware scanner, data security check and more
  • Ends automatically after 30 days