Demo
Zero-day Worm Whaling Water-holing (watering hole attack) Vulnerability Management Service (VMS) Vulnerability Virtual Private Network (VPN) User and Entity Behaviour Analytics (UEBA) Two-factor authentication (2FA) Trojan horse