glossary What is a watering hole attack (Watering hole attack)? A watering hole attack (Watering hole attack) is where an attacker guesses or observes the websites that an organizatio... 2021.12.11 glossary
glossary What is steganography? Steganography is a technique for hiding a message inside another message or physical object. The most common method ... 2021.12.11 glossary
glossary What is a Credential Stuffing Attack? Credential stuffing is a type of cyber attack in which stolen account credentials (usually a username or email address ... 2021.12.11 glossary
glossary What is Vishing, a Voice Phishing Attack? Phishing is a form of social engineering in which an attacker sends a fake message created to trick the victim into pro... 2021.12.11 glossaryNews
glossary What is a SIEM, what are its main features, and what threats can it detect? SIEM (Security Information and Event Management) is a solution that provides centralized visibility into a company's IT... 2021.12.11 glossary
glossary What is Conti? The Conti ransomware is believed to be operated by Wizard Spider, a cybercrime group based in Russia. This group use... 2021.12.11 glossary
glossary What are hands-on-keyboard attacks? (hands-on-keyboard attacks) A method of executing commands by actual human hands, rather than programmatically and automatically performing operati... 2021.12.11 glossary
glossary What is a fileless attack (fileless malware)? Fileless malware is a type of malicious software that resides only in the memory-based RAM of a computer. Very effec... 2021.12.11 glossary
glossary What is double-extortion? Double extortion is a technique employed by some ransomware organizations. Normal ransomware encrypts the victim's d... 2021.12.11 glossary
glossary What is business email compromise BEC? A business email compromise (BEC) attack is a type of cybercrime that uses email fraud to target specific organizations... 2021.12.11 glossary