Monday 26th June 2023
[ rɪˈmoʊtli ˈtrɪɡərd sɪˈkjʊrəti hoʊl ]
information security term
A vulnerability intentionally programmed into a device or system, which can be exploited by an attacker with remote access to gain unauthorized access or control over the device or system.
Seen something in your logs?