BlackFog Logo

Cybersecurity 101

A B C D E F G H I K L M N O P Q R S T U V W Z

Nitrogen

The Nitrogen ransomware group is a recently identified threat actor, first noted in 2024, and is part of the steady stream of new ransomware names entering the ecosystem. Reporting on Nitrogen is still sparse, indicating it is likely in an early phase of activity or operating as a rebranded variant rather than an established [...]

2025-12-16T13:34:06+00:00December 16th, 2025|

Nova

The Nova ransomware group is a recently surfaced threat actor, first observed in 2024, and appears to be part of the ongoing wave of newly branded ransomware operations. Public reporting on Nova is limited. Nova’s activity indicates a preference for focused, opportunistic attacks rather than large-scale campaigns. The group combines system encryption with data [...]

2025-12-16T13:38:48+00:00December 16th, 2025|

Obscura

The Obscura ransomware group is a newly identified threat actor and appears to be part of the continual churn of emerging ransomware brands. Information on Obscura remains limited, suggesting it is either in an early operational phase or deliberately maintaining a low profile while establishing its presence. Obscura’s operations indicate a measured and selective [...]

2025-12-16T13:40:01+00:00December 16th, 2025|

On Device

On Device defines application functionality that operates entirely on the CPU of the device operating system it is installed on. This contrasts with applications that use remote servers (cloud infrastructure) to perform data processing.

2022-09-23T21:55:25+01:00July 19th, 2022|

Patch

A patch is a set of software changes that fixes a bug or security vulnerability in a software already currently in use by the organization.

2023-03-08T15:48:30+00:00March 8th, 2023|

Payouts King

The Payouts King ransomware group is a newly identified threat actor and forms part of the ongoing influx of fresh ransomware brands. Limited public reporting suggests the group is likely in an early phase of operations or running a short-term campaign rather than maintaining a long-standing presence. Payouts King’s activity points to a pragmatic, [...]

2025-12-16T13:41:23+00:00December 16th, 2025|

PEAR

The PEAR ransomware group is a newly surfaced actor  adding to the growing list of emerging ransomware brands. With only limited public reporting available, PEAR appears to be in a formative stage, potentially testing operations or building a reputation through early attacks. Observed activity suggests PEAR favors a low-noise, high-pressure approach, gaining access quietly [...]

2025-12-16T13:50:08+00:00December 16th, 2025|

Penetration Testing

Penetration testing, also known as a pen test or ethical hacking, is an authorized simulated cyberattack used to identify, test and highlight vulnerabilities in an organization's security posture.

2023-03-07T16:56:59+00:00March 7th, 2023|

Personally Identifiable Information

Personally identifiable information (PII) is any data that when used alone, or with other relevant data, could identify a specific individual. Examples include (but are not limited to): name, address, contact number, email address, driver's license number, SSN, D.O.B, passport number, fingerprint.

2023-07-05T15:30:08+01:00July 5th, 2023|

Phishing

Phishing is defined as a form of social engineering in which a cyber threat actor poses as a trustworthy colleague or acquaintance of an organization to lure a victim into providing sensitive information or network access.

2023-03-08T13:52:21+00:00March 8th, 2023|