BlackFog Logo

Cybersecurity 101

A B C D E F G H I K L M N O P Q R S T U V W Z

Kill

The Kill ransomware group is a threat actor that has surfaced intermittently in 2023–2024. Public information about the group is limited. Kill uses data encryption and extortion tactics, with some indications of double extortion, where stolen data is leveraged alongside system disruption to pressure victims. Targets are typically small to mid-sized organizations, often those [...]

2025-12-16T10:58:34+00:00December 16th, 2025|

Kill Ransomware Group

The Kill ransomware group, also known as KillSec or KillSecurity, is a cybercriminal organization. They employ a ransomware-as-a-service (RaaS) model, allowing affiliates to execute attacks using their malware infrastructure. KillSec is known for targeting various industries, including manufacturing and wholesale sectors. KillSec's ransomware variants, such as KillSecurity 2.0 and KillSecurity 3.0, are designed to [...]

2025-02-13T16:37:51+00:00February 13th, 2025|

LLM

What is an LLM (Large Language Model)? A Large Language Model (LLM) is a type of artificial intelligence system designed to understand, process, and generate human language. LLMs are trained on massive datasets containing text from books, websites, documents, and other written sources. Through this training process, the model learns patterns in language, allowing [...]

2026-03-05T10:14:19+00:00March 5th, 2026|

LockBit

The LockBit ransomware group is one of the most prolific and impactful ransomware operations to date, first emerging in 2019 and evolving into a highly organized ransomware-as-a-service (RaaS) ecosystem. LockBit has targeted organizations of all sizes worldwide, across sectors including healthcare, manufacturing, financial services, education, and government. Its scale and consistency made it a [...]

2025-12-16T10:59:48+00:00December 16th, 2025|

LotAI

LotAI, or “Living off the AI,” is an emerging cybersecurity threat technique in which attackers exploit legitimate artificial intelligence tools and assistants to conduct malicious activity.

2026-04-23T13:17:49+01:00April 23rd, 2026|

Lotus C2

What is Lotus C2? Lotus C2 is a command-and-control (C2) framework sold as a cybercrime toolkit that enables attackers to remotely control compromised systems and carry out a variety of malicious activities. Discovered on underground cybercrime forums, Lotus C2 is marketed as a professional security testing platform but is primarily designed to support cybercriminal [...]

2026-03-05T13:20:40+00:00March 5th, 2026|

Lynx

The Lynx ransomware group is a relatively new threat actor that emerged in 2024, operating as part of the expanding ecosystem of modern ransomware operations. Lynx appears to be financially motivated and follows patterns consistent with a ransomware-as-a-service (RaaS) or affiliate-based model, targeting organizations across multiple industries. Lynx employs double extortion tactics, exfiltrating sensitive [...]

2025-12-16T11:01:05+00:00December 16th, 2025|

Malvertising

Malvertising, also known as malicious advertising, refers to an attack in which cybercriminals inject malicious code into legitimate online advertising networks, redirecting users to malicious websites, with the goal of spreading malware. These malicious ads can exploit vulnerabilities in the user’s browser, operating system, or even in plugins like Flash or Java, leading to [...]

2024-11-14T14:29:59+00:00March 8th, 2023|

Malware

Malware is a term for any type of program, file or malicious software designed to infect, damage, exploit or gain access to a device, network or server.

2023-03-07T16:54:11+00:00March 7th, 2023|

Man in the Middle (MITM) Attack

A man in the middle (MITM) attack occurs when communications between two parties are intercepted by the attacker, with no knowledge of the parties involved. This gives the attacker the ability to steal credentials, spy on victims, sabotage victims or corrupt/manipulate data.

2023-07-05T14:58:17+01:00July 5th, 2023|