Glossary

A

Attack Surface

Attack Surface What is an Attack Surface? An attack surface refers to all the different points where an unauthorized …

Access Control

Access Control What is Access Control Access control in cybersecurity is a way to decide who can use certain resources …

Account Takeover (ATO)

Account Takeover (ATO) What are Account Takeover Attacks Account Takeovers are a type of attack where cybercriminal …

B

Breach Intelligence

Breach Intelligence What is Breach Intelligence? Breach Intelligence is a subset of threat intelligence focused on …

Brand Intelligence

Brand Intelligence What is Brand Intelligence? Brand Intelligence is a type of threat intelligence focused on the …

Brand Monitoring

Brand Monitoring What is Brand Monitoring? In the context of cybersecurity, brand monitoring enables organizations to …

Brand Protection

Brand Protection What is Brand Protection Brand protection is the process of preventing others from illegally using your …

C

Cybersecurity Attack

Cybersecurity Attack What is a Cybersecurity Attack? A cybersecurity attack is when bad actors try to break into a …

D

Doxing

Doxing What is doxing? Doxing (also spelled “doxxing”) is short for “dropping documents” and refers to the act of …

Digital Risk Protection

Digital Risk Protection What is Digital Risk Protection? Digital Risk Protection (DRP) is a set of strategies and tools …

Domain Spoofing

Domain Spoofing What is Domain Spoofing? Domain spoofing is a type of attack where a threat actor creates a fake website …

Domain Monitoring

Domain Monitoring What is Domain Monitoring? Domain monitoring is the cybersecurity practice of monitoring an …

Domain Protection

Domain Protection What is Domain Protection? Domain protection involves securing a website’s domain name from various …

Dark Web Threat Intelligence

Dark Web Threat Intelligence What is Dark Web Threat Intelligence Dark Web Threat Intelligence refers to the process of …

E

Email Spoofing

Email Spoofing What is Email Spoofing Email spoofing is when someone sends an email that looks like it came from a …

External Cybersecurity

External Cybersecurity What is External Cybersecurity? External cybersecurity focuses on protecting an organization’s …

External Threat Intelligence Services

External Threat Intelligence Services What are External Threat Intelligence Services? External Threat Intelligence …

F

Fraud Detection

Fraud Detection What is Fraud Detection? Fraud detection is the process of identifying and preventing fraudulent …

G

Geopolitical Intelligence

Geopolitical Intelligence What is Geopolitical Intelligence? Geopolitical intelligence is curated information about …

I

Impersonation Attacks

Impersonation Attacks What Is an Impersonation Attack? An impersonation attack is a type of cyber attack where an …

Information Leakage

Information Leakage What is Information Leakage Information leakage refers to the unintended or unauthorized …

K

Keylogger

Keylogger What is a keylogger? A keylogger is a type of malicious software or hardware that records everything you type …

M

Malware Intelligence

Malware Intelligence What is Malware Intelligence? Malware intelligence is a type of threat intelligence focused on …

O

Open Source Intelligence

Open Source Intelligence What is Open Source Intelligence? Open Source Intelligence (OSINT) is a type of threat …

P

Phishing Campaign

Phishing Campaign What is a Phishing Campaign? A phishing campaign is a scam where threat actors send fraudulent …

R

Ransomware

Ransomware What is ransomware? Ransomware is a type of malicious software (malware) that locks or encrypts your computer …

S

Social Media Risk

Social Media Risk Social Media in Cyber Threat Intelligence While businesses often leverage their social media presence …

Spoofing Emails

Spoofing Emails What is Email Spoofing? Email spoofing is when someone sends an email that looks like it’s from a …

Supply Chain Intelligence

Supply Chain Intelligence What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence …

T

Threat Intelligence Tools

Threat Intelligence Tools What Are Threat Intelligence Tools? Threat intelligence tools are software and services that …

Threat Intelligence Platform (TIP)

Threat Intelligence Platform What is a Threat Intelligence Platform (TIP)? A Threat Intelligence Platform (TIP) is a …

V

Vulnerability Intelligence

Vulnerability Intelligence What is Vulnerability Intelligence? Vulnerability intelligence is a form of threat …

W

Whale Phishing

Whale Phishing What is a whale phishing attack? A whale phishing attack, also known as whaling, is a type of phishing …