glossary

glossary

What is a watering hole attack (Watering hole attack)?

A watering hole attack (Watering hole attack) is where an attacker guesses or observes the websites that an organization...
glossary

What is steganography?

Steganography is a technique for hiding a message inside another message or physical object. The most common method of h...
glossary

What is a Credential Stuffing Attack?

Credential stuffing is a type of cyber attack in which stolen account credentials (usually a username or email address a...
glossary

What is Vishing, a Voice Phishing Attack?

Phishing is a form of social engineering in which an attacker sends a fake message created to trick the victim into prov...
glossary

What is a SIEM, what are its main features, and what threats can it detect?

SIEM (Security Information and Event Management) is a solution that provides centralized visibility into a company's IT ...
glossary

What is Conti?

The Conti ransomware is believed to be operated by Wizard Spider, a cybercrime group based in Russia. This group uses ph...
glossary

What are hands-on-keyboard attacks? (hands-on-keyboard attacks)

A method of executing commands by actual human hands, rather than programmatically and automatically performing operatio...
glossary

What is a fileless attack (fileless malware)?

Fileless malware is a type of malicious software that resides only in the memory-based RAM of a computer. Very effective...
glossary

What is double-extortion?

Double extortion is a technique employed by some ransomware organizations. Normal ransomware encrypts the victim's data ...
glossary

What is business email compromise BEC?

A business email compromise (BEC) attack is a type of cybercrime that uses email fraud to target specific organizations ...