Malconfiguration
A deliberate configuration change within a system by a malicious actor, typically to create back-door access or exfiltrate information. While the original change in configuration might involve a compromised account or other vulnerability, a malconfiguration has the benefit of offering long term access using legitimate tools, without further need of a password or after a vulnerability is closed.
Gain full visibility
with our Data Risk Assessment.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.