Glossary Cybersecurity / Term
A distinct pattern in network traffic that can be identified to a specific tool or exploit. Signatures are used by security software to determine if a file has been previously determined to be malicious or not.
Permanent link Signature - Creation date 2021-05-01