Glossary

A

Account Takeover (ATO)

Account Takeover (ATO) Attacks Imagine logging into your organization’s bank account only to find that all the money’s …

Attack Surface

Attack Surface What is an Attack Surface? An organization’s attack surface is all the ways a hacker can break in. Think …

Access Control

Access Control Access control might sound technical, but at its core, it’s really about keeping the right doors open for …

B

Brand Protection

Brand Protection What is Brand Protection Brand protection is protecting your brand’s intellectual property from …

Brand Monitoring

Brand Monitoring What is Brand Monitoring? In cybersecurity, brand monitoring means tracking your company’s name and …

Brand Intelligence

Brand Intelligence What is Brand Intelligence? Brand Intelligence is a subset of threat intelligence. It monitors and …

Breach Intelligence

Breach Intelligence Getting blindsided by a data breach is every business’s worst nightmare. But what if you could see …

C

Cybersecurity Attack

Cybersecurity Attack What is a Cybersecurity Attack? A cybersecurity attack is when bad actors attempt to steal data …

D

Digital Executive Protection

Digital Executive Protection What is digital executive protection? Imagine waking up to find your social media accounts …

Domain Protection

Domain Protection What is Domain Protection? Domain protection is the process of protecting your online domains. A …

Domain Spoofing

Domain Spoofing What is Domain Spoofing? Domain spoofing happens when a threat actor creates a fake website or sends …

Doxing

Doxing What is Doxing? Doxing, also spelled “Doxxing,” is short for “dropping documents”. Doxing is the act of publicly …

Domain Monitoring

Domain Monitoring What is Domain Monitoring? Domain monitoring is the practice of monitoring an organization’s internet …

Digital Risk Protection

Digital Risk Protection What is digital executive protection? Imagine waking up to find your social media accounts …

Dark Web Threat Intelligence

Dark Web Threat Intelligence What is Dark Web Threat Intelligence Dark Web Threat Intelligence is the process of …

E

External Threat Intelligence Services

External Threat Intelligence Services What are External Threat Intelligence Services? External Threat Intelligence …

External Cybersecurity

External Cybersecurity What is External Cybersecurity? External cybersecurity focuses on protecting an organization’s …

Email Spoofing

Email Spoofing What is Email Spoofing Email spoofing occurs when an attacker sends an email that appears to come from a …

F

Fraud Detection

Fraud Detection What is Fraud Detection? Fraud detection identifies and prevents unauthorized activities, like data …

G

Geopolitical Intelligence

Geopolitical Intelligence What is Geopolitical Intelligence? Geopolitical Intelligence is the systematic gathering and …

I

Impersonation Attacks

Impersonation Attacks What Is an Impersonation Attack? An impersonation attack is a type of cyber attack where an …

InfoStealer Malware

InfoStealer Malware What is InfoStealer Malware? InfoStealers are a type of malware designed to secretly collect and …

Information Leakage

Information Leakage What is Information Leakage Information leakage refers to the unintended or unauthorized …

K

Keylogger

Keylogger What is a keylogger? A keylogger is a type of malicious software or hardware that records everything you type …

L

Leaked Credentials

Leaked Credentials What are leaked credentials? Leaked credentials are usernames, passwords, and other authentication …

M

MTTR

MTTR What is MTTR? MTTR stands for Mean Time to Respond and measures the average time it takes for a security team to …

Malware Intelligence

Malware Intelligence What is Malware Intelligence? Malware intelligence is a type of threat intelligence focused on …

O

Open Source Intelligence

Open Source Intelligence What is Open Source Intelligence? Open Source Intelligence (OSINT) is a type of threat …

P

Phishing Campaign

Phishing Campaign What is a Phishing Campaign? A phishing campaign is a scam where threat actors send fraudulent …

R

Ransomware

Ransomware What is ransomware? Ransomware is a type of malicious software (malware) that locks or encrypts your computer …

S

Social Media Risk

Social Media Risk Social Media in Cyber Threat Intelligence While businesses often leverage their social media presence …

Spoofing Emails

Spoofing Emails What is Email Spoofing? Email spoofing is when someone sends an email that looks like it’s from a …

Supply Chain Intelligence

Supply Chain Intelligence What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence …

T

Threat Intelligence Tools

Threat Intelligence Tools What Are Threat Intelligence Tools? Threat intelligence tools are software and services that …

Threat Intelligence Platform (TIP)

Threat Intelligence Platform What is a Threat Intelligence Platform (TIP)? A Threat Intelligence Platform (TIP) is a …

V

Vulnerability Intelligence

Vulnerability Intelligence What is Vulnerability Intelligence? Vulnerability intelligence is a form of threat …

W

Whale Phishing

Whale Phishing What is a whale phishing attack? A whale phishing attack, also known as whaling, is a type of phishing …

Z

Zero Day Exploit

Zero Day Exploit What does zero-day mean? A zero-day (also known as 0-day) refers to a vulnerability that is unknown to …