BlackFog Logo

Cybersecurity 101

A B C D E F G H I K L M N O P Q R S T U V W Z

CIA Triad

The CIA Triad is a foundational concept in cybersecurity that serves as a model for securing information and ensuring the integrity of systems. The acronym CIA stands for Confidentiality, Integrity, and Availability, which are considered the three core principles of information security. These principles guide the development and implementation of security policies, strategies, and [...]

2024-11-07T12:36:19+00:00July 5th, 2023|

CiphBit

The CiphBit ransomware group is a relatively new and low-profile threat actor that emerged around 2023, operating within the growing ecosystem of emerging ransomware brands. The group appears to be financially motivated and targets small to mid-sized organizations, often those with limited security maturity and exposed attack surfaces. CiphBit follows the double extortion model, [...]

2025-12-16T10:43:34+00:00December 16th, 2025|

Clickjacking

Clickjacking is a malicious technique used by cybercriminals to deceive users into interacting with something different from what they perceive on their screens. This attack typically occurs through a seemingly harmless webpage, where an invisible or disguised element is placed over a legitimate button, link, or interface. When a user clicks on what they [...]

2024-11-07T12:41:34+00:00September 21st, 2022|

Cloud

The Cloud refers to a system of delivering computing services—including storage, processing power, networking, databases, and software—over the internet, rather than from a local server or personal device. The term "cloud" is a metaphor for the internet, where data and applications are hosted on remote servers rather than being stored on a physical machine [...]

2024-11-07T12:47:00+00:00July 5th, 2023|

Consumer Data Right (CDR) Australia

The Australian Government has introduced Consumer Data Right in Australia. Consumer Data Right will give consumers, including individuals and business, a secure way to control which businesses have access to their data.

2022-09-23T21:50:15+01:00July 19th, 2022|

Cookies

Cookies are text files with small pieces of data from a website, used to identify your computer, that is stored within a web browser and can be retrieved by the website at a later time. Cookies play a key role in enhancing the user experience by remembering certain information about the user and their [...]

2024-11-07T13:42:41+00:00July 6th, 2023|

Critical National Infrastructure (CNI)

According to the National Proactive Security Authority, Critical National Infrastructure (CNI) is those critical elements of infrastructure (namely assets, facilities, systems, networks or processes and the essential workers that operate and facilitate them), the loss or compromise of which could result in: a) Major detrimental impact on the availability, integrity or delivery of essential [...]

2024-11-07T13:56:17+00:00July 5th, 2023|

Crypto Ransomware

Among the oldest, and traditionally the most common form of ransomware, crypto ransomware works by finding valuable files on a system and applying encryption to them so they become unusable.

2024-11-08T12:00:02+00:00July 26th, 2022|

Crypto24

The Crypto24 ransomware group is a little-known and emerging threat actor that started claiming victims in 2025, operating as part of the expanding landscape of smaller ransomware operations. Public information about Crypto24 remains limited. Crypto24 employs data encryption and extortion tactics, with some campaigns indicating elements of double extortion, where victims are threatened with [...]

2025-12-16T10:45:48+00:00December 16th, 2025|