glossary What is a watering hole attack (Watering hole attack)? A watering hole attack (Watering hole attack) is where an attacker guesses or observes the websites that an organization... 2021.12.11 glossary
glossary What is steganography? Steganography is a technique for hiding a message inside another message or physical object. The most common method of h... 2021.12.11 glossary
glossary What is a Credential Stuffing Attack? Credential stuffing is a type of cyber attack in which stolen account credentials (usually a username or email address a... 2021.12.11 glossary
glossary What is Vishing, a Voice Phishing Attack? Phishing is a form of social engineering in which an attacker sends a fake message created to trick the victim into prov... 2021.12.11 glossarynews
glossary What is a SIEM, what are its main features, and what threats can it detect? SIEM (Security Information and Event Management) is a solution that provides centralized visibility into a company's IT ... 2021.12.11 glossary
glossary What is Conti? The Conti ransomware is believed to be operated by Wizard Spider, a cybercrime group based in Russia. This group uses ph... 2021.12.11 glossary
glossary What are hands-on-keyboard attacks? (hands-on-keyboard attacks) A method of executing commands by actual human hands, rather than programmatically and automatically performing operatio... 2021.12.11 glossary
glossary What is a fileless attack (fileless malware)? Fileless malware is a type of malicious software that resides only in the memory-based RAM of a computer. Very effective... 2021.12.11 glossary
glossary What is double-extortion? Double extortion is a technique employed by some ransomware organizations. Normal ransomware encrypts the victim's data ... 2021.12.11 glossary
glossary What is business email compromise BEC? A business email compromise (BEC) attack is a type of cybercrime that uses email fraud to target specific organizations ... 2021.12.11 glossary