« Back to Glossary IndexThe moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network. Related Articles: Glossary: Data BreachGlossary: Digital ForensicsGlossary: Threat