The term C2, or C&C, typically refers to Command and Control Infrastucture. It is the set of tools and techniques used by attackers to maintain control over a compromised system following initial exploitation, and in order to exfiltrate sensitive data or perform other malicious activities. ..Defending against C2-based attacks requires a... Read More
Online security refers to the practice of protecting devices, networks, and sensitive information from unauthorized access, theft, or damage...The term is also known as cybersecurity or internet security and cover a wide range of practices to secue and protect computers, mobile devices, and networks from digital attacks. Online security is... Read More
RATs is the abbreviation for Remote Access Trojans. This specific Trojan is a type of malware that allows an attacker to take control of a victim's computer remotely. RATs have been around for many years and continue to be a significant threat to computer users...Remote Access Trojan Definition. A Remote Access Trojan (RAT) is malware whose... Read More
A spoofed URL is a fake link that has been made to look legitimate in order to trick you and steal your data. Sometimes, just clicking on a spoofed URL is enough to infect your device with malware. Other times, the website will be designed to look identical to the one you trust, so you'll have the confidence to enter sensitive information and... Read More
Whaling, also known as CEO fraud, whaling phishing, whale phishing, or a whaling phishing attack, is similar in technique to phishing - the method involves email and website spoofing and relies on social engineering to trick the victim into carrying out specific actions e.g. revealing sensitive data or transferring funds. ..A whaling attack... Read More
Ransomware is a type of malicious software, also known as malware, which is often used by cybercriminals to launch sophisticated cyberattacks on individuals, organizations, or institutions. As its name suggests, ransomware revolves around the idea of a 'ransom.' Once ransomware infiltrates a user's system, it seeks to either encrypt the user's... Read More
A firewall is a critical element in the cybersecurity landscape. It's a network security device or system that observes and controls incoming and outgoing network traffic predicated on beforehand defined security rules. The concept of a firewall, in physical terms, manifests as a wall intended to halt the spread of fire. When tailored to... Read More
A Trojan Horse, in the context of cybersecurity and antivirus solutions, refers to a particular type of malicious software (malware) that often deceive users of its true intent. The name is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth. In a similar sense, Trojan... Read More
A VPN, also known as a Virtual Private Network, is a cybersecurity tool that creates an encrypted connection over the internet from a device to a network, ensuring the device's outgoing and incoming data remains inaccessible to third parties. As a critical security mechanism heavily connected with antivirus solutions, VPNs help keep systems and... Read More
Next-Gen Antivirus (NGAV) is a modern, advanced solution for cybersecurity threats, equipped with many features which traditional antivirus systems lack. Paving the way forward, it embodies the most advanced technological responses to the perpetually iterative landscape of cybercrime. The terminology 'next-gen' depicts the progressive... Read More
An Intrusion Detection System (IDS) is a fundamental element of cybersecurity infrastructures and technologies. The primary task of an IDS is to monitor, identify, and block, if possible, potential unlawful and harmful activities in an information system. IDS is vigilance personified in the cyberspace. It analyses the network traffic and... Read More
Fileless exploits are a specific category of cyber threats that use genuine applications and software typically present in operating systems to carry out their malicious actions. Unlike traditional malware that relies on explicit files or code to harm their targets, fileless exploits do not leave tangible traces which makes them harder to detect,... Read More
Endpoint Detection and Response (EDR) is a sophisticated method used to monitor, detect, and rapidly respond to threats on an end-user device such as smartphones, tablets, or laptops. The primary idea behind EDR is to offer continuous monitoring and response to advanced security threats across various endpoints in a network. It does not merely... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |