From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Computer Security along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2025-06-01 to 2025-06-30
Total views: 4,758,561
Updated: 07:59, 6 July 2025 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
HTTP cookie
|
214,413
|
7,147
|
C
|
High
|
2
|
Anonymous (hacker group)
|
81,306
|
2,710
|
GA
|
Mid
|
3
|
Pegasus (spyware)
|
71,248
|
2,374
|
B
|
Low
|
4
|
Have I Been Pwned?
|
65,696
|
2,189
|
Start
|
High
|
5
|
TamilRockers
|
64,420
|
2,147
|
Start
|
Low
|
6
|
Blockchain
|
62,461
|
2,082
|
B
|
Top
|
7
|
Phishing
|
57,850
|
1,928
|
B
|
High
|
8
|
Proxy server
|
50,637
|
1,687
|
B
|
High
|
9
|
WarGames
|
39,684
|
1,322
|
C
|
Low
|
10
|
Cryptography
|
37,231
|
1,241
|
C
|
Top
|
11
|
Secure Shell
|
37,162
|
1,238
|
C
|
High
|
12
|
List of Tor onion services
|
37,056
|
1,235
|
List
|
Low
|
13
|
Cloudflare
|
35,909
|
1,196
|
C
|
Low
|
14
|
Virtual private network
|
33,973
|
1,132
|
C
|
Mid
|
15
|
Reality Winner
|
32,356
|
1,078
|
B
|
Mid
|
16
|
DJI
|
28,714
|
957
|
C
|
Low
|
17
|
Self-driving car
|
27,258
|
908
|
B
|
Mid
|
18
|
Phone hacking
|
27,076
|
902
|
Start
|
Mid
|
19
|
Google hacking
|
26,770
|
892
|
Start
|
Low
|
20
|
Malware
|
26,226
|
874
|
C
|
Top
|
21
|
Multi-factor authentication
|
26,078
|
869
|
C
|
High
|
22
|
Russian interference in the 2016 United States elections
|
25,702
|
856
|
B
|
High
|
23
|
Facebook–Cambridge Analytica data scandal
|
24,602
|
820
|
C
|
High
|
24
|
Zero-day vulnerability
|
24,404
|
813
|
C
|
High
|
25
|
Kevin Mitnick
|
24,081
|
802
|
C
|
High
|
26
|
Man-in-the-middle attack
|
23,164
|
772
|
C
|
Mid
|
27
|
Swatting
|
22,790
|
759
|
C
|
Mid
|
28
|
Lolita City
|
21,980
|
732
|
Start
|
Low
|
29
|
SQL injection
|
20,991
|
699
|
Start
|
High
|
30
|
CrowdStrike
|
20,832
|
694
|
B
|
Mid
|
31
|
Hackers (film)
|
20,249
|
674
|
C
|
Low
|
32
|
ILOVEYOU
|
19,532
|
651
|
C
|
Mid
|
33
|
Cybercrime
|
19,358
|
645
|
C
|
High
|
34
|
Palo Alto Networks
|
19,200
|
640
|
C
|
High
|
35
|
Reverse engineering
|
18,727
|
624
|
C
|
High
|
36
|
Lazarus Group
|
18,436
|
614
|
C
|
Mid
|
37
|
Pretty Good Privacy
|
18,250
|
608
|
B
|
High
|
38
|
Privacy
|
18,190
|
606
|
C
|
High
|
39
|
Vault 7
|
17,997
|
599
|
C
|
Unknown
|
40
|
Adobe Flash
|
17,752
|
591
|
C
|
Low
|
41
|
Operation Olympic Games
|
17,728
|
590
|
Start
|
Mid
|
42
|
BIOS
|
17,683
|
589
|
B
|
Mid
|
43
|
Software testing
|
17,578
|
585
|
C
|
Low
|
44
|
Aladdin (BlackRock)
|
17,545
|
584
|
Stub
|
Low
|
45
|
Cross-site request forgery
|
17,333
|
577
|
C
|
High
|
46
|
Cryptographic hash function
|
17,310
|
577
|
C
|
High
|
47
|
Sneakers (1992 film)
|
17,207
|
573
|
B
|
Low
|
48
|
Kali Linux
|
16,239
|
541
|
Start
|
Mid
|
49
|
Timeline of events associated with Anonymous
|
15,476
|
515
|
C
|
Low
|
50
|
Information security
|
15,264
|
508
|
B
|
Top
|
51
|
Social engineering (security)
|
15,150
|
505
|
C
|
High
|
52
|
Cross-site scripting
|
15,037
|
501
|
B
|
High
|
53
|
Ransomware
|
14,973
|
499
|
GA
|
High
|
54
|
Password manager
|
14,816
|
493
|
C
|
Mid
|
55
|
Kerberos (protocol)
|
14,802
|
493
|
C
|
High
|
56
|
VirusTotal
|
14,560
|
485
|
Start
|
High
|
57
|
Certificate authority
|
14,163
|
472
|
C
|
High
|
58
|
List of the most common passwords
|
13,888
|
462
|
List
|
Unknown
|
59
|
Trusted Platform Module
|
13,616
|
453
|
C
|
High
|
60
|
Security hacker
|
13,114
|
437
|
C
|
Top
|
61
|
NSO Group
|
13,074
|
435
|
B
|
Mid
|
62
|
Human–computer interaction
|
12,915
|
430
|
C
|
Low
|
63
|
Time-based one-time password
|
12,848
|
428
|
C
|
High
|
64
|
Startpage
|
12,830
|
427
|
C
|
Low
|
65
|
OAuth
|
12,813
|
427
|
C
|
Mid
|
66
|
Mail and wire fraud
|
12,776
|
425
|
Start
|
Mid
|
67
|
Single sign-on
|
12,696
|
423
|
C
|
High
|
68
|
ReCAPTCHA
|
12,395
|
413
|
B
|
Mid
|
69
|
List of data breaches
|
12,286
|
409
|
List
|
High
|
70
|
Keychain (software)
|
12,223
|
407
|
Start
|
Low
|
71
|
Ashley Madison data breach
|
12,213
|
407
|
Start
|
Mid
|
72
|
Okta, Inc.
|
12,123
|
404
|
Start
|
Mid
|
73
|
Race condition
|
12,075
|
402
|
C
|
Mid
|
74
|
Zip bomb
|
12,018
|
400
|
Start
|
Low
|
75
|
Public key infrastructure
|
12,017
|
400
|
C
|
High
|
76
|
Automatic Certificate Management Environment
|
11,919
|
397
|
Start
|
Low
|
77
|
News International phone hacking scandal
|
11,857
|
395
|
C
|
Mid
|
78
|
Phreaking
|
11,830
|
394
|
C
|
Mid
|
79
|
Salt Typhoon
|
11,819
|
393
|
C
|
Unknown
|
80
|
EICAR test file
|
11,672
|
389
|
C
|
Low
|
81
|
Tails (operating system)
|
11,547
|
384
|
Start
|
Mid
|
82
|
Data breach
|
11,489
|
382
|
GA
|
Mid
|
83
|
Playpen (website)
|
11,293
|
376
|
Start
|
Low
|
84
|
Trojan horse (computing)
|
11,269
|
375
|
C
|
High
|
85
|
Spyware
|
11,240
|
374
|
B
|
High
|
86
|
White hat (computer security)
|
11,181
|
372
|
Start
|
Low
|
87
|
STRIDE model
|
11,094
|
369
|
Start
|
Low
|
88
|
Authentication
|
11,072
|
369
|
C
|
High
|
89
|
Cyberwarfare
|
11,025
|
367
|
C
|
High
|
90
|
Zscaler
|
10,826
|
360
|
Start
|
Low
|
91
|
2014 Sony Pictures hack
|
10,695
|
356
|
C
|
High
|
92
|
Brute-force attack
|
10,650
|
355
|
C
|
High
|
93
|
Honeypot (computing)
|
10,498
|
349
|
Start
|
High
|
94
|
Payment Card Industry Data Security Standard
|
10,428
|
347
|
Start
|
Low
|
95
|
Electronic voting in India
|
10,367
|
345
|
GA
|
High
|
96
|
Risk
|
10,343
|
344
|
C
|
Top
|
97
|
Return-oriented programming
|
10,304
|
343
|
C
|
High
|
98
|
Wiz, Inc.
|
10,257
|
341
|
Start
|
Low
|
99
|
Zero trust architecture
|
10,109
|
336
|
C
|
High
|
100
|
End-to-end encryption
|
10,080
|
336
|
C
|
Mid
|
101
|
Hardware security module
|
9,946
|
331
|
Start
|
Mid
|
102
|
Synopsys
|
9,875
|
329
|
B
|
Mid
|
103
|
Sony BMG copy protection rootkit scandal
|
9,841
|
328
|
B
|
Low
|
104
|
Advanced persistent threat
|
9,831
|
327
|
B
|
High
|
105
|
Role-based access control
|
9,754
|
325
|
C
|
Mid
|
106
|
Integer overflow
|
9,691
|
323
|
Start
|
Unknown
|
107
|
Bitwarden
|
9,596
|
319
|
C
|
Mid
|
108
|
VeraCrypt
|
9,501
|
316
|
C
|
High
|
109
|
Same-origin policy
|
9,489
|
316
|
Start
|
High
|
110
|
Fortinet
|
9,468
|
315
|
C
|
Mid
|
111
|
OpenBSD
|
9,451
|
315
|
B
|
High
|
112
|
SIM swap scam
|
9,361
|
312
|
Start
|
Mid
|
113
|
Hacktivism
|
9,207
|
306
|
C
|
High
|
114
|
YubiKey
|
9,154
|
305
|
Start
|
Low
|
115
|
Protection ring
|
8,916
|
297
|
B
|
High
|
116
|
Maia arson crimew
|
8,891
|
296
|
GA
|
Low
|
117
|
Children's Online Privacy Protection Act
|
8,763
|
292
|
Start
|
Low
|
118
|
Cyberspace
|
8,747
|
291
|
C
|
High
|
119
|
Electronic Frontier Foundation
|
8,738
|
291
|
C
|
High
|
120
|
Morris worm
|
8,726
|
290
|
C
|
High
|
121
|
DMZ (computing)
|
8,656
|
288
|
Start
|
High
|
122
|
Internet leak
|
8,496
|
283
|
C
|
High
|
123
|
Gary McKinnon
|
8,350
|
278
|
C
|
High
|
124
|
Script kiddie
|
8,337
|
277
|
Start
|
Mid
|
125
|
Kill switch
|
8,279
|
275
|
C
|
Low
|
126
|
Keystroke logging
|
8,277
|
275
|
C
|
Low
|
127
|
United States Cyber Command
|
8,208
|
273
|
B
|
High
|
128
|
Intel Management Engine
|
8,160
|
272
|
C
|
High
|
129
|
Penetration test
|
8,109
|
270
|
C
|
Mid
|
130
|
Microsoft Defender Antivirus
|
8,048
|
268
|
C
|
Mid
|
131
|
Botnet
|
7,983
|
266
|
C
|
High
|
132
|
Common Vulnerabilities and Exposures
|
7,959
|
265
|
C
|
Top
|
133
|
OpenID
|
7,943
|
264
|
B
|
Low
|
134
|
Buffer overflow
|
7,883
|
262
|
B
|
High
|
135
|
Federal Information Processing Standards
|
7,801
|
260
|
Start
|
Low
|
136
|
Operation Trojan Shield
|
7,729
|
257
|
C
|
Low
|
137
|
Lightning Network
|
7,613
|
253
|
Start
|
Low
|
138
|
KeePass
|
7,447
|
248
|
C
|
Mid
|
139
|
Software cracking
|
7,424
|
247
|
Start
|
Mid
|
140
|
Security-Enhanced Linux
|
7,379
|
245
|
C
|
High
|
141
|
Web cache
|
7,294
|
243
|
Start
|
Low
|
142
|
ChaCha20-Poly1305
|
7,176
|
239
|
C
|
Low
|
143
|
Petya (malware family)
|
7,167
|
238
|
C
|
High
|
144
|
Malwarebytes (software)
|
7,165
|
238
|
C
|
Mid
|
145
|
Access control
|
7,026
|
234
|
C
|
High
|
146
|
Red team
|
7,022
|
234
|
GA
|
Low
|
147
|
Dynamic-link library
|
7,019
|
233
|
C
|
Unknown
|
148
|
Jay Chaudhry
|
6,998
|
233
|
Stub
|
Low
|
149
|
Identity and access management
|
6,944
|
231
|
C
|
High
|
150
|
ID.me
|
6,942
|
231
|
Start
|
Low
|
151
|
Moxie Marlinspike
|
6,929
|
230
|
B
|
Low
|
152
|
Black hat (computer security)
|
6,886
|
229
|
C
|
Mid
|
153
|
Whitelist
|
6,883
|
229
|
Start
|
Low
|
154
|
Right to privacy
|
6,849
|
228
|
C
|
High
|
155
|
Sudo
|
6,846
|
228
|
B
|
Low
|
156
|
Darktrace
|
6,708
|
223
|
Start
|
Low
|
157
|
Electronic voting
|
6,690
|
223
|
C
|
Unknown
|
158
|
Bangladesh Bank robbery
|
6,627
|
220
|
C
|
Low
|
159
|
CyberArk
|
6,562
|
218
|
C
|
Low
|
160
|
Email spoofing
|
6,558
|
218
|
Start
|
Mid
|
161
|
Nmap
|
6,542
|
218
|
C
|
Mid
|
162
|
RADIUS
|
6,539
|
217
|
C
|
Mid
|
163
|
Backdoor (computing)
|
6,524
|
217
|
C
|
Mid
|
164
|
1Password
|
6,509
|
216
|
C
|
Low
|
165
|
CCleaner
|
6,504
|
216
|
C
|
High
|
166
|
LulzSec
|
6,491
|
216
|
B
|
High
|
167
|
Adrian Lamo
|
6,445
|
214
|
C
|
High
|
168
|
Scammer Payback
|
6,431
|
214
|
Start
|
Mid
|
169
|
List of warez groups
|
6,312
|
210
|
Start
|
Mid
|
170
|
Wi-Fi Protected Setup
|
6,253
|
208
|
C
|
Mid
|
171
|
Podesta emails
|
6,239
|
207
|
C
|
Low
|
172
|
Timeline of computer viruses and worms
|
6,195
|
206
|
Start
|
High
|
173
|
Clickjacking
|
6,147
|
204
|
B
|
Mid
|
174
|
The Tor Project
|
6,124
|
204
|
C
|
Top
|
175
|
Tiny Banker Trojan
|
6,080
|
202
|
C
|
Low
|
176
|
Climatic Research Unit email controversy
|
6,039
|
201
|
B
|
Low
|
177
|
OWASP
|
6,032
|
201
|
C
|
Low
|
178
|
Access-control list
|
6,015
|
200
|
Start
|
High
|
179
|
Len Sassaman
|
5,969
|
198
|
C
|
Low
|
180
|
Security through obscurity
|
5,959
|
198
|
C
|
Mid
|
181
|
Low Orbit Ion Cannon
|
5,934
|
197
|
Start
|
Low
|
182
|
Fancy Bear
|
5,907
|
196
|
C
|
High
|
183
|
Weev
|
5,891
|
196
|
C
|
Low
|
184
|
SentinelOne
|
5,861
|
195
|
Start
|
Unknown
|
185
|
File-system permissions
|
5,845
|
194
|
C
|
High
|
186
|
The Cuckoo's Egg (book)
|
5,817
|
193
|
Start
|
Low
|
187
|
Log4Shell
|
5,783
|
192
|
C
|
Mid
|
188
|
List of hacker groups
|
5,704
|
190
|
Start
|
Mid
|
189
|
Certified Information Systems Security Professional
|
5,693
|
189
|
C
|
Mid
|
190
|
Address space layout randomization
|
5,683
|
189
|
C
|
High
|
191
|
Off-by-one error
|
5,671
|
189
|
Start
|
Unknown
|
192
|
Microsoft Intune
|
5,651
|
188
|
Start
|
Mid
|
193
|
List of security hacking incidents
|
5,634
|
187
|
List
|
High
|
194
|
Hybrid warfare
|
5,631
|
187
|
C
|
High
|
195
|
Common Vulnerability Scoring System
|
5,553
|
185
|
C
|
High
|
196
|
Null character
|
5,525
|
184
|
Start
|
Mid
|
197
|
Credential stuffing
|
5,503
|
183
|
C
|
High
|
198
|
Avast Antivirus
|
5,492
|
183
|
Start
|
Mid
|
199
|
Zero Days
|
5,459
|
181
|
Start
|
Low
|
200
|
Cyber Resilience Act
|
5,342
|
178
|
C
|
Low
|
201
|
Infostealer
|
5,338
|
177
|
B
|
Low
|
202
|
Avast
|
5,270
|
175
|
B
|
Mid
|
203
|
Trellix
|
5,262
|
175
|
B
|
Mid
|
204
|
BlackCat (cyber gang)
|
5,259
|
175
|
Start
|
Low
|
205
|
Marcus Hutchins
|
5,253
|
175
|
B
|
Mid
|
206
|
Jim Browning (YouTuber)
|
5,228
|
174
|
Start
|
Low
|
207
|
IDN homograph attack
|
5,207
|
173
|
C
|
Mid
|
208
|
Personal identification number
|
5,181
|
172
|
C
|
High
|
209
|
NIST Cybersecurity Framework
|
5,174
|
172
|
Start
|
Top
|
210
|
Sophos
|
5,171
|
172
|
Start
|
Mid
|
211
|
IntelBroker
|
5,158
|
171
|
B
|
Low
|
212
|
Replay attack
|
5,146
|
171
|
C
|
High
|
213
|
Fork (blockchain)
|
5,123
|
170
|
Start
|
Low
|
214
|
Searx
|
5,070
|
169
|
C
|
Unknown
|
215
|
Row hammer
|
4,964
|
165
|
GA
|
Low
|
216
|
Metasploit
|
4,943
|
164
|
C
|
Mid
|
217
|
Paywall
|
4,926
|
164
|
C
|
Mid
|
218
|
Brain (computer virus)
|
4,904
|
163
|
C
|
Low
|
219
|
2016 Democratic National Committee email leak
|
4,833
|
161
|
C
|
Mid
|
220
|
Cyberwarfare and Iran
|
4,811
|
160
|
Start
|
Mid
|
221
|
Code injection
|
4,804
|
160
|
C
|
High
|
222
|
Lattice-based cryptography
|
4,763
|
158
|
Start
|
Low
|
223
|
DNS sinkhole
|
4,761
|
158
|
Start
|
Unknown
|
224
|
Cold boot attack
|
4,758
|
158
|
C
|
Low
|
225
|
KeePassXC
|
4,755
|
158
|
Start
|
Low
|
226
|
Mutual authentication
|
4,664
|
155
|
Stub
|
Low
|
227
|
Attribute-based access control
|
4,659
|
155
|
C
|
Mid
|
228
|
Patch Tuesday
|
4,652
|
155
|
C
|
Mid
|
229
|
NTLM
|
4,645
|
154
|
C
|
Mid
|
230
|
Object-capability model
|
4,625
|
154
|
Start
|
Mid
|
231
|
Pegasus Project (investigation)
|
4,624
|
154
|
C
|
Low
|
232
|
Nintendo data leak
|
4,615
|
153
|
C
|
Low
|
233
|
Web of trust
|
4,611
|
153
|
C
|
Low
|
234
|
2017 Ukraine ransomware attacks
|
4,597
|
153
|
C
|
High
|
235
|
Norton AntiVirus
|
4,550
|
151
|
C
|
Mid
|
236
|
Fake news website
|
4,518
|
150
|
C
|
Low
|
237
|
John the Ripper
|
4,470
|
149
|
Start
|
Low
|
238
|
Collision avoidance system
|
4,442
|
148
|
C
|
Mid
|
239
|
Xbox Underground
|
4,437
|
147
|
C
|
Low
|
240
|
Let's Encrypt
|
4,431
|
147
|
B
|
Low
|
241
|
Chinese wall
|
4,415
|
147
|
C
|
Low
|
242
|
Chaos Computer Club
|
4,411
|
147
|
C
|
Mid
|
243
|
Fail2ban
|
4,410
|
147
|
Start
|
Mid
|
244
|
Burp Suite
|
4,379
|
145
|
Start
|
Low
|
245
|
Billion laughs attack
|
4,373
|
145
|
Start
|
Low
|
246
|
Business continuity planning
|
4,361
|
145
|
B
|
Mid
|
247
|
Tiger team
|
4,353
|
145
|
Start
|
Unknown
|
248
|
ClamAV
|
4,341
|
144
|
Start
|
Unknown
|
249
|
Dahua Technology
|
4,338
|
144
|
B
|
Low
|
250
|
CalyxOS
|
4,332
|
144
|
C
|
Low
|
251
|
LockBit
|
4,271
|
142
|
C
|
High
|
252
|
Weird machine
|
4,253
|
141
|
Stub
|
Low
|
253
|
Mitigation
|
4,235
|
141
|
Start
|
Mid
|
254
|
Internet security
|
4,187
|
139
|
C
|
High
|
255
|
Samsung Knox
|
4,170
|
139
|
Start
|
Mid
|
256
|
Flame (malware)
|
4,157
|
138
|
C
|
Mid
|
257
|
SpyEye
|
4,145
|
138
|
Stub
|
Unknown
|
258
|
SAML 2.0
|
4,137
|
137
|
C
|
Low
|
259
|
Mydoom
|
4,121
|
137
|
Start
|
Mid
|
260
|
ActionScript
|
4,117
|
137
|
C
|
Low
|
261
|
Ungoogled-chromium
|
4,093
|
136
|
Start
|
Low
|
262
|
Conficker
|
4,089
|
136
|
B
|
Mid
|
263
|
Threat model
|
4,085
|
136
|
Start
|
Low
|
264
|
Cozy Bear
|
4,085
|
136
|
C
|
Mid
|
265
|
Mirror site
|
4,077
|
135
|
C
|
Mid
|
266
|
Digital forensics
|
4,024
|
134
|
GA
|
High
|
267
|
Security token
|
4,008
|
133
|
C
|
High
|
268
|
Lapsus$
|
4,004
|
133
|
C
|
Low
|
269
|
2011 PlayStation Network outage
|
3,994
|
133
|
C
|
Mid
|
270
|
Time-of-check to time-of-use
|
3,978
|
132
|
Start
|
Low
|
271
|
Obfuscation (software)
|
3,975
|
132
|
C
|
Mid
|
272
|
ESET
|
3,946
|
131
|
Start
|
Low
|
273
|
Computer and network surveillance
|
3,899
|
129
|
C
|
Top
|
274
|
Bruce Schneier
|
3,860
|
128
|
Start
|
High
|
275
|
Kill chain (military)
|
3,851
|
128
|
Start
|
Unknown
|
276
|
Timing attack
|
3,798
|
126
|
C
|
Mid
|
277
|
Evaluation Assurance Level
|
3,795
|
126
|
Start
|
Low
|
278
|
Bug bounty program
|
3,788
|
126
|
C
|
High
|
279
|
Creeper and Reaper
|
3,785
|
126
|
Start
|
Low
|
280
|
NSAKEY
|
3,763
|
125
|
C
|
High
|
281
|
Ron Rivest
|
3,761
|
125
|
Start
|
High
|
282
|
ISACA
|
3,760
|
125
|
Start
|
Low
|
283
|
Hector Monsegur
|
3,752
|
125
|
Start
|
Low
|
284
|
Data security
|
3,750
|
125
|
Start
|
High
|
285
|
Jonathan James
|
3,742
|
124
|
Start
|
Low
|
286
|
Proofpoint, Inc.
|
3,736
|
124
|
Start
|
Low
|
287
|
Intel Active Management Technology
|
3,731
|
124
|
C
|
High
|
288
|
Cyberwarfare by Russia
|
3,728
|
124
|
B
|
High
|
289
|
Port scanner
|
3,709
|
123
|
B
|
High
|
290
|
The Artifice Girl
|
3,692
|
123
|
Start
|
Low
|
291
|
Albert Gonzalez
|
3,687
|
122
|
C
|
Mid
|
292
|
Brian Krebs
|
3,675
|
122
|
Start
|
Low
|
293
|
Technical support scam
|
3,653
|
121
|
GA
|
Mid
|
294
|
Memory safety
|
3,607
|
120
|
C
|
Low
|
295
|
Wickr
|
3,578
|
119
|
C
|
Mid
|
296
|
Voice phishing
|
3,563
|
118
|
Stub
|
Mid
|
297
|
Radia Perlman
|
3,552
|
118
|
C
|
Mid
|
298
|
Iptables
|
3,550
|
118
|
C
|
Mid
|
299
|
List of cybercriminals
|
3,529
|
117
|
List
|
Mid
|
300
|
Cult of the Dead Cow
|
3,495
|
116
|
C
|
Mid
|
301
|
Confused deputy problem
|
3,483
|
116
|
Start
|
High
|
302
|
File inclusion vulnerability
|
3,477
|
115
|
Start
|
Mid
|
303
|
Shellshock (software bug)
|
3,469
|
115
|
C
|
High
|
304
|
Dan Kaminsky
|
3,467
|
115
|
B
|
Mid
|
305
|
Vendor
|
3,429
|
114
|
Start
|
Low
|
306
|
Bread Financial
|
3,419
|
113
|
Start
|
Low
|
307
|
Content Security Policy
|
3,415
|
113
|
C
|
High
|
308
|
LastPass
|
3,398
|
113
|
Start
|
Low
|
309
|
Physical security
|
3,376
|
112
|
C
|
Top
|
310
|
Evil maid attack
|
3,345
|
111
|
C
|
Mid
|
311
|
Shamoon
|
3,342
|
111
|
Start
|
Mid
|
312
|
Root certificate
|
3,335
|
111
|
Start
|
Mid
|
313
|
Dictionary attack
|
3,297
|
109
|
C
|
High
|
314
|
Cyber kill chain
|
3,293
|
109
|
Start
|
Mid
|
315
|
Blacklist (computing)
|
3,290
|
109
|
Start
|
Mid
|
316
|
Buffer overflow protection
|
3,256
|
108
|
C
|
Mid
|
317
|
Netfilter
|
3,253
|
108
|
C
|
Mid
|
318
|
Aubrey Cottle
|
3,248
|
108
|
C
|
Mid
|
319
|
ISC2
|
3,240
|
108
|
Start
|
Mid
|
320
|
Mandatory access control
|
3,239
|
107
|
C
|
High
|
321
|
Arbitrary code execution
|
3,232
|
107
|
C
|
High
|
322
|
Contingency plan
|
3,205
|
106
|
Start
|
High
|
323
|
Daniel J. Bernstein
|
3,187
|
106
|
C
|
Mid
|
324
|
BGP hijacking
|
3,184
|
106
|
Stub
|
Mid
|
325
|
Bell–LaPadula model
|
3,178
|
105
|
C
|
Low
|
326
|
OneTrust
|
3,177
|
105
|
C
|
Low
|
327
|
Computer forensics
|
3,167
|
105
|
C
|
High
|
328
|
Voter-verified paper audit trail
|
3,160
|
105
|
C
|
High
|
329
|
Privacy law
|
3,160
|
105
|
Start
|
High
|
330
|
Hacker ethic
|
3,151
|
105
|
C
|
High
|
331
|
Jeremy Hammond
|
3,148
|
104
|
C
|
Low
|
332
|
DarkMatter Group
|
3,138
|
104
|
C
|
Low
|
333
|
Yahoo data breaches
|
3,137
|
104
|
GA
|
Mid
|
334
|
Email hacking
|
3,132
|
104
|
Start
|
Mid
|
335
|
23andMe data leak
|
3,130
|
104
|
Start
|
Low
|
336
|
Dmitri Alperovitch
|
3,108
|
103
|
C
|
Low
|
337
|
Nulled
|
3,108
|
103
|
Start
|
Unknown
|
338
|
Troy Hunt
|
3,095
|
103
|
Start
|
Low
|
339
|
Wardialing
|
3,094
|
103
|
Start
|
Unknown
|
340
|
List of cyberattacks
|
3,087
|
102
|
List
|
High
|
341
|
Russian interference in the 2024 United States elections
|
3,064
|
102
|
C
|
Low
|
342
|
Mark of the Web
|
3,021
|
100
|
Start
|
Low
|
343
|
Network security
|
3,000
|
100
|
Start
|
High
|
344
|
AVG AntiVirus
|
2,994
|
99
|
Start
|
Low
|
345
|
Certificate Transparency
|
2,980
|
99
|
C
|
High
|
346
|
Third-party cookies
|
2,975
|
99
|
C
|
Low
|
347
|
Electronic voting by country
|
2,961
|
98
|
C
|
Unknown
|
348
|
Slopsquatting
|
2,956
|
98
|
C
|
Low
|
349
|
MAC spoofing
|
2,952
|
98
|
Start
|
Unknown
|
350
|
Code Red (computer worm)
|
2,913
|
97
|
Start
|
Low
|
351
|
Endpoint detection and response
|
2,912
|
97
|
Start
|
Low
|
352
|
Forcepoint
|
2,905
|
96
|
Start
|
Unknown
|
353
|
Operation Aurora
|
2,900
|
96
|
C
|
Mid
|
354
|
Open banking
|
2,892
|
96
|
C
|
Low
|
355
|
Drive-by download
|
2,876
|
95
|
Start
|
High
|
356
|
Dangling pointer
|
2,874
|
95
|
C
|
Mid
|
357
|
List of password managers
|
2,844
|
94
|
List
|
Low
|
358
|
The Crash (2017 film)
|
2,829
|
94
|
Start
|
Low
|
359
|
Duqu
|
2,812
|
93
|
C
|
Mid
|
360
|
Bluesnarfing
|
2,805
|
93
|
Start
|
Low
|
361
|
Certified ethical hacker
|
2,800
|
93
|
Start
|
Low
|
362
|
Shellcode
|
2,777
|
92
|
B
|
High
|
363
|
Hacker Manifesto
|
2,768
|
92
|
Start
|
Mid
|
364
|
Team Xecuter
|
2,765
|
92
|
Start
|
Low
|
365
|
Offensive Security
|
2,764
|
92
|
C
|
Low
|
366
|
Common Criteria
|
2,743
|
91
|
Start
|
Low
|
367
|
Non-repudiation
|
2,720
|
90
|
Start
|
Mid
|
368
|
Four Horsemen of the Infocalypse
|
2,719
|
90
|
Start
|
Low
|
369
|
Nunes memo
|
2,713
|
90
|
B
|
Low
|
370
|
Cloud computing security
|
2,702
|
90
|
Start
|
Unknown
|
371
|
Dr.Web
|
2,701
|
90
|
Start
|
Low
|
372
|
Capability-based security
|
2,693
|
89
|
Start
|
High
|
373
|
Smurf attack
|
2,691
|
89
|
C
|
Mid
|
374
|
Secure by design
|
2,688
|
89
|
Start
|
High
|
375
|
Akira (ransomware)
|
2,676
|
89
|
Stub
|
Low
|
376
|
Kevin Poulsen
|
2,666
|
88
|
Start
|
Mid
|
377
|
CIH (computer virus)
|
2,663
|
88
|
Start
|
Low
|
378
|
Briar (software)
|
2,645
|
88
|
Start
|
Low
|
379
|
Opportunistic TLS
|
2,640
|
88
|
Start
|
Mid
|
380
|
Blaster (computer worm)
|
2,629
|
87
|
Start
|
Low
|
381
|
Cain and Abel (software)
|
2,628
|
87
|
Start
|
Low
|
382
|
Van Eck phreaking
|
2,617
|
87
|
C
|
Low
|
383
|
ATT&CK
|
2,575
|
85
|
Stub
|
Low
|
384
|
Scareware
|
2,561
|
85
|
Start
|
Mid
|
385
|
AACS encryption key controversy
|
2,556
|
85
|
GA
|
Low
|
386
|
Offensive Security Certified Professional
|
2,545
|
84
|
Start
|
Mid
|
387
|
COBIT
|
2,523
|
84
|
Start
|
High
|
388
|
Data retention
|
2,501
|
83
|
C
|
Low
|
389
|
SwiftOnSecurity
|
2,497
|
83
|
Stub
|
Low
|
390
|
DDoS attacks on Dyn
|
2,489
|
82
|
C
|
Mid
|
391
|
BeyondTrust
|
2,486
|
82
|
Stub
|
Low
|
392
|
2600: The Hacker Quarterly
|
2,484
|
82
|
Start
|
Mid
|
393
|
Jacob Appelbaum
|
2,469
|
82
|
B
|
Low
|
394
|
Hack Forums
|
2,465
|
82
|
C
|
Low
|
395
|
Melissa (computer virus)
|
2,461
|
82
|
Start
|
Unknown
|
396
|
PLA Unit 61398
|
2,453
|
81
|
Start
|
Mid
|
397
|
Nessus (software)
|
2,449
|
81
|
Start
|
Low
|
398
|
Cyberwarfare and China
|
2,408
|
80
|
C
|
High
|
399
|
Ping of death
|
2,388
|
79
|
Start
|
Low
|
400
|
Cyberweapon
|
2,382
|
79
|
Start
|
High
|
401
|
Data loss prevention software
|
2,378
|
79
|
Start
|
Mid
|
402
|
Avira
|
2,363
|
78
|
C
|
Low
|
403
|
Pseudonymization
|
2,360
|
78
|
Start
|
Unknown
|
404
|
Office of Personnel Management data breach
|
2,358
|
78
|
C
|
High
|
405
|
Security-focused operating system
|
2,354
|
78
|
List
|
Mid
|
406
|
Click fraud
|
2,352
|
78
|
C
|
Low
|
407
|
DREAD (risk assessment model)
|
2,328
|
77
|
Start
|
Low
|
408
|
Markus Hess
|
2,322
|
77
|
Start
|
Low
|
409
|
BREACH
|
2,317
|
77
|
Start
|
High
|
410
|
GhostNet
|
2,315
|
77
|
C
|
Mid
|
411
|
2015 Ukraine power grid hack
|
2,308
|
76
|
C
|
Mid
|
412
|
Shoulder surfing (computer security)
|
2,303
|
76
|
C
|
Low
|
413
|
Mark Abene
|
2,290
|
76
|
Start
|
Mid
|
414
|
Chief information security officer
|
2,289
|
76
|
Start
|
Mid
|
415
|
DarkSide (hacker group)
|
2,289
|
76
|
Start
|
Low
|
416
|
Mermaids (charity)
|
2,279
|
75
|
Start
|
Low
|
417
|
Chaos Communication Congress
|
2,262
|
75
|
Start
|
Low
|
418
|
Dark0de
|
2,234
|
74
|
Start
|
Mid
|
419
|
Keeper (password manager)
|
2,230
|
74
|
Start
|
Low
|
420
|
Indian WhatsApp lynchings
|
2,229
|
74
|
List
|
High
|
421
|
Tanium
|
2,201
|
73
|
Start
|
Low
|
422
|
FIPS 140
|
2,200
|
73
|
Start
|
Low
|
423
|
Application security
|
2,192
|
73
|
Start
|
High
|
424
|
Threat actor
|
2,192
|
73
|
C
|
Mid
|
425
|
SANS Institute
|
2,191
|
73
|
Start
|
Mid
|
426
|
New generation warfare
|
2,184
|
72
|
Start
|
Low
|
427
|
Comparison of computer viruses
|
2,178
|
72
|
List
|
High
|
428
|
Whiz Kids (TV series)
|
2,163
|
72
|
C
|
Low
|
429
|
CRIME
|
2,154
|
71
|
Start
|
High
|
430
|
Darik's Boot and Nuke
|
2,142
|
71
|
Start
|
Unknown
|
431
|
Federated identity
|
2,134
|
71
|
Start
|
High
|
432
|
ISO/IEC 27002
|
2,124
|
70
|
Stub
|
Low
|
433
|
Attack surface
|
2,119
|
70
|
Stub
|
Mid
|
434
|
Acceptable use policy
|
2,115
|
70
|
Start
|
Mid
|
435
|
Mikko Hyppönen
|
2,107
|
70
|
C
|
Low
|
436
|
Supersingular isogeny key exchange
|
2,106
|
70
|
Start
|
Low
|
437
|
Goatse Security
|
2,105
|
70
|
Start
|
Low
|
438
|
Fake news websites in the United States
|
2,099
|
69
|
B
|
High
|
439
|
Information security standards
|
2,093
|
69
|
C
|
Top
|
440
|
2007 cyberattacks on Estonia
|
2,076
|
69
|
Start
|
High
|
441
|
Comparison of instant messaging protocols
|
2,072
|
69
|
List
|
Low
|
442
|
CYREN
|
2,068
|
68
|
B
|
Mid
|
443
|
Fufufafa
|
2,068
|
68
|
C
|
Unknown
|
444
|
Entrust
|
2,065
|
68
|
Start
|
Unknown
|
445
|
SiegedSec
|
2,062
|
68
|
C
|
Low
|
446
|
List of spyware programs
|
2,061
|
68
|
Start
|
Low
|
447
|
Virus hoax
|
2,056
|
68
|
C
|
Low
|
448
|
Cellebrite UFED
|
2,048
|
68
|
C
|
Low
|
449
|
Snort (software)
|
2,047
|
68
|
Start
|
Mid
|
450
|
Legion of Doom (hacker group)
|
2,036
|
67
|
Start
|
Low
|
451
|
EPrivacy Directive
|
2,033
|
67
|
C
|
Low
|
452
|
Authentication, authorization, and accounting
|
2,019
|
67
|
Start
|
Mid
|
453
|
Microsoft Security Essentials
|
2,013
|
67
|
C
|
Mid
|
454
|
Control-flow integrity
|
2,011
|
67
|
C
|
High
|
455
|
Bureau 121
|
2,010
|
67
|
C
|
Low
|
456
|
Rogue security software
|
2,009
|
66
|
C
|
High
|
457
|
Browser hijacking
|
2,007
|
66
|
C
|
High
|
458
|
Communications security
|
2,001
|
66
|
Start
|
Mid
|
459
|
Mobile security
|
1,995
|
66
|
C
|
Top
|
460
|
Gutmann method
|
1,990
|
66
|
C
|
Mid
|
461
|
Hashcat
|
1,982
|
66
|
C
|
Low
|
462
|
FIPS 140-3
|
1,981
|
66
|
C
|
Low
|
463
|
Hackers: Heroes of the Computer Revolution
|
1,975
|
65
|
Start
|
Low
|
464
|
Webroot
|
1,952
|
65
|
Start
|
Low
|
465
|
Cyber-security regulation
|
1,947
|
64
|
C
|
High
|
466
|
Carbanak
|
1,946
|
64
|
Start
|
Low
|
467
|
Computer emergency response team
|
1,945
|
64
|
Start
|
High
|
468
|
Secure cryptoprocessor
|
1,941
|
64
|
C
|
Mid
|
469
|
Coordinated vulnerability disclosure
|
1,941
|
64
|
Stub
|
High
|
470
|
Self-destruct
|
1,937
|
64
|
C
|
Low
|
471
|
Diameter (protocol)
|
1,928
|
64
|
Start
|
Low
|
472
|
Email privacy
|
1,921
|
64
|
C
|
Mid
|
473
|
Spy pixel
|
1,920
|
64
|
C
|
Low
|
474
|
List of compact discs sold with Extended Copy Protection
|
1,919
|
63
|
List
|
Low
|
475
|
Cybersecurity Maturity Model Certification
|
1,915
|
63
|
C
|
Low
|
476
|
CryptoLocker
|
1,909
|
63
|
C
|
Mid
|
477
|
SQL Slammer
|
1,898
|
63
|
Start
|
Low
|
478
|
List of cyber warfare forces
|
1,890
|
63
|
Start
|
Low
|
479
|
Dropper (malware)
|
1,889
|
62
|
Stub
|
Mid
|
480
|
Next-generation firewall
|
1,889
|
62
|
Start
|
Low
|
481
|
Security.txt
|
1,888
|
62
|
Start
|
Low
|
482
|
Market for zero-day exploits
|
1,885
|
62
|
C
|
High
|
483
|
Trishneet Arora
|
1,878
|
62
|
Start
|
Low
|
484
|
HackThisSite
|
1,855
|
61
|
C
|
Low
|
485
|
Dynamic application security testing
|
1,853
|
61
|
Start
|
Low
|
486
|
Google Safe Browsing
|
1,843
|
61
|
Start
|
Unknown
|
487
|
Encrypting File System
|
1,841
|
61
|
B
|
Mid
|
488
|
List of computer security certifications
|
1,839
|
61
|
List
|
Mid
|
489
|
Ankit Fadia
|
1,811
|
60
|
Start
|
Low
|
490
|
Interdiction
|
1,809
|
60
|
Start
|
Low
|
491
|
360 Total Security
|
1,806
|
60
|
Start
|
Low
|
492
|
Trust on first use
|
1,806
|
60
|
Start
|
Low
|
493
|
Roman Seleznev
|
1,804
|
60
|
Start
|
Low
|
494
|
Secure cookie
|
1,800
|
60
|
Start
|
High
|
495
|
Access token
|
1,799
|
59
|
Start
|
Mid
|
496
|
Trusted timestamping
|
1,799
|
59
|
Start
|
Unknown
|
497
|
BusKill
|
1,795
|
59
|
Start
|
Low
|
498
|
Key server (cryptographic)
|
1,787
|
59
|
Start
|
Mid
|
499
|
Reception and criticism of WhatsApp security and privacy features
|
1,786
|
59
|
C
|
Low
|
500
|
Chain of trust
|
1,781
|
59
|
Start
|
Mid
|