CSIRT
CTI
Exploit
Malware
Post Exploitation
Vulnerability
Visit also our blog dedicated to web security research