T
Threat Vector
A threat vector is a path or method through which a cyberattack can gain unauthorized access to an organization’s systems, networks, or data. It can include various means, such as phishing emails, malware, unsecured networks, or vulnerabilities in software, through which attackers exploit weaknesses to launch an attack.
Trojan Horse
A Trojan Horse is a type of malicious software, often disguised as legitimate looking software, that enables cybercriminals to fully access a computer system remotely. This malware will breach the system, for example allowing the hacker to download files from the system or even observe the user's keystrokes.