BlackFog Logo

Cybersecurity 101

A B C D E F G H I K L M N O P Q R S T U V W Z

Endpoint Protection

Endpoint protection is an approach to protect endpoints or entry points of end-user devices such as desktops, laptops and mobile devices from being exploited by malicious actors and campaigns. In the context of a networked environment, endpoints are the points where users and devices interact with the network. As organizations increasingly rely on these [...]

2024-11-11T13:58:36+00:00July 6th, 2023|

Ethical Hacker

Also known as a "white hat" hacker, an ethical hacker is a security expert who is called in to uncover security vulnerabilities which threat actors could exploit. They are responsible for evaluating the security of systems, networks or system infrastructures and identify vulnerabilities and attempt to exploit problems that could cause unauthorized access to [...]

2022-09-23T21:52:37+01:00September 21st, 2022|

Everest

The Everest ransomware group is a well-established ransomware-as-a-service (RaaS) operation that has been active since 2020. The group targets medium to large organizations across a wide range of sectors, including healthcare, manufacturing, financial services, and government-related entities. Everest is known for its deliberate, targeted approach rather than indiscriminate mass attacks. Everest relies heavily on [...]

2025-12-16T10:52:33+00:00December 16th, 2025|

Extended Detection and Response (XDR)

Extended Detection and Response (XDR) solutions provide extended visibility, analysis and response across endpoints, networks, cloud and applications. This technology applies analytics and automation to detect, analyse, hunt, and remediate threats. DR is designed to overcome the limitations of traditional security solutions by providing a unified platform that correlates data from various sources to [...]

2024-11-11T14:03:51+00:00March 7th, 2023|

Extortion

Extortion refers to the act of coercing an individual or organization into providing money, services, or other valuable assets by threatening to cause harm to their digital assets, reputation, or sensitive data. This threat may involve various forms of cybercrime, including data breaches, service disruption, or the release of confidential information. Cyber extortion is [...]

2024-11-11T14:10:21+00:00March 8th, 2023|

File Pumping

File pumping is a technique used by malware and ransomware that is used to artificially inflate the size of a file by injecting it with additional bytes to bypass cybersecurity tools.

2024-11-11T14:14:28+00:00January 20th, 2024|

Firewall

A firewall is a network security device that monitors and filters incoming and outgoing traffic based on an organization's defined security rules, protecting networks from unauthorized access to private data. It acts as a barrier between a trusted internal network (such as a corporate or private network) and untrusted external networks (such as the [...]

2024-11-11T15:16:58+00:00March 8th, 2023|

Firmware

Firmware is a type of software embedded into hardware devices that provides basic machine instructions to control their functionality and communicate with other software running on the device. Firmware is often considered the bridge between the hardware and the higher-level software (such as operating systems or applications) that interacts with the hardware. Unlike traditional [...]

2024-11-11T15:21:39+00:00July 5th, 2023|

Funksec

FunkSec is a relatively new ransomware group that emerged in late 2024, quickly gaining notoriety for its high volume of attacks and distinctive tactics.

2025-02-13T16:27:06+00:00February 13th, 2025|

General Data Protection Regulation (GDPR)

The EU General Data Protection Regulation (GDPR) is a significant piece of European legislation that came into force on May 25, 2018. It builds on existing data protection laws, strengthening the rights that EU individuals have over their personal data, and creating a single data protection approach across Europe.

2022-09-23T21:52:53+01:00July 19th, 2022|