Glossary

A

B C D E F

G

H

I

J

K

L

M

N

O

P

Q

R

S T

U

V W

X

Y

Z

B

Brand Monitoring

Brand monitoring is the practice of tracking your company’s name and digital assets across the internet to detect …

Brand Protection

Brand protection in cybersecurity is the practice of defending your brand from being weaponized against your customers …

Breach Intelligence

Breach intelligence is a specialized form of threat intelligence focused on collecting and analyzing information about …

C

Credential Harvesting

Credential harvesting is a cyberattack technique where attackers collect usernames and passwords at scale through …

D

Digital Executive Protection

Digital executive protection is a specialized security discipline focused on protecting high-profile individuals from …

Domain Monitoring

Domain monitoring is the practice of tracking your internet domains and watching for threats like typosquatting, DNS …

Domain Spoofing: How Attackers Impersonate Your Brand

Domain spoofing is an attack technique where threat actors create fake websites or emails that appear to come from a …

E

Email Spoofing

Email spoofing is the act of forging the sender address in an email to make it appear to come from someone other than …

F

Fraud Detection

Fraud detection is the process of identifying unauthorized or suspicious activity designed to result in financial gain …

I

Infostealer Malware

Infostealer malware (also called stealer malware) is malicious software designed to extract sensitive data from infected …

M

MTTR and MTTD

MTTR (Mean Time To Respond) measures the average time it takes for a security team to contain and remediate an incident …

P

Passwordless Authentication

Passwordless authentication is an authentication approach that verifies user identity without traditional passwords. It …

Pretexting

Pretexting is a social engineering technique where attackers create fabricated scenarios to manipulate victims into …

S

Smishing

Smishing (SMS phishing) is a social engineering attack that uses text messages to trick victims into revealing sensitive …

Spyware

Spyware is malicious software designed to secretly monitor and collect information from infected devices without the …

T

Threat Actors

Threat actors are individuals or groups that conduct malicious cyber activities against organizations, governments, or …

V

Vishing

Vishing (voice phishing) is a social engineering attack conducted over phone calls. Attackers impersonate trusted …

Vulnerability Intelligence

Vulnerability intelligence is the collection and analysis of information about software vulnerabilities. It goes beyond …

W

Whale Phishing

Whale phishing (also called whaling) is a targeted phishing attack directed at high-profile individuals like executives …