BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Access Brokers

Access brokers (also known as initial access brokers) are criminal groups who specialize in selling illegitimate access to corporate networks. These groups breach the networks and then sell the access on to ransomware and other cybercriminal groups. How do initial access brokers operate? Initial access brokers (IABs) are skilled at identifying and exploiting [...]

2024-04-15T16:40:06+01:00November 1st, 2022|

Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an intruder, or team of intruders, gain access to a network using sophisticated hacking techniques, and remain undetected for an extended period of time. The targets of these APT attacks are chosen by threat actors after thorough research and typically include large [...]

2024-10-11T14:10:33+01:00March 7th, 2023|

Adware

Adware is a type of malware that displays unwanted pop up advertisements on your computer or device. Adware is commonly activated unknowingly when a user is trying to install legitimate applications that the adware is bundled with. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly [...]

2024-10-09T11:39:44+01:00July 6th, 2023|

Allowlist

An allowlist, also known as a whitelist, is a cybersecurity strategy which approves email addresses, IP addresses, domain names or application, denying access to others. Users can only gain access to the whitelisted items. An allowlist contrasts sharply with a blocklist, which identifies entities that are explicitly denied access. By focusing on what is [...]

2024-10-11T14:10:57+01:00March 7th, 2023|

Antivirus

Antivirus is a program designed to prevent, scan, detect, and remove viruses and other types of malicious software from devices and networks. Key Functions of Antivirus Software Detection: Antivirus software uses various methods to identify malware. This includes signature-based detection, where the software uses a database of known malware signatures to identify threats. [...]

2024-10-11T14:11:30+01:00March 8th, 2023|

Attack Vector

An attack vector is the pathway or method that a hacker takes to illegally access a network or computer in an attempt to exploit cybersecurity vulnerabilities.

2023-07-06T08:16:22+01:00July 6th, 2023|

Backdoor

A backdoor in cybersecurity is an undocumented way of gaining access to a computer system or network, bypassing an organization's existing security solutions and defenses.

2023-07-05T15:07:07+01:00July 5th, 2023|

Baiting

Baiting is a social engineering attack where a scammer uses a false promise or reward to lure victims into a trap which may steal personal or financial information by infecting their systems with malware.

2023-07-06T08:13:28+01:00July 6th, 2023|

Baselining

Baselining is the process of creating a baseline of what constitutes as normal behaviour and utilization in a network so that significant deviations can be detected and investigated.

2023-07-05T15:08:05+01:00July 5th, 2023|