Zero-day
Worm
Whaling
Water-holing (watering hole attack)
Vulnerability Management Service (VMS)
Vulnerability
Virtual Private Network (VPN)
User and Entity Behaviour Analytics (UEBA)
Two-factor authentication (2FA)
Trojan horse