BlackFog Logo

Cybersecurity 101

A B C D E F G H I K L M N O P Q R S T U V W Z

Abyss

The Abyss ransomware group is a ransomware group that emerged around 2020, operating primarily as a ransomware-as-a-service (RaaS) group. Abyss is known for targeting large organizations, including enterprises in healthcare, manufacturing, and professional services. Abyss typically uses double extortion tactics, encrypting victims’ data while also stealing sensitive information and threatening to publish it if [...]

2025-12-16T10:32:19+00:00December 16th, 2025|

Access Brokers

Access brokers (also known as initial access brokers) are criminal groups who specialize in selling illegitimate access to corporate networks. These groups breach the networks and then sell the access on to ransomware and other cybercriminal groups.

2024-11-14T16:13:16+00:00September 1st, 2024|

Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an intruder, or team of intruders, gain access to a network using sophisticated hacking techniques, and remain undetected for an extended period of time.

2024-11-14T16:07:03+00:00September 1st, 2024|

Adware

Adware is a type of malware that displays unwanted pop up advertisements on your computer or device. Adware is commonly activated unknowingly when a user is trying to install legitimate applications that the adware is bundled with. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly [...]

2024-11-14T16:14:00+00:00September 1st, 2024|

Akira

The Akira ransomware group emerged in early 2023 and has quickly become one of the more active and disruptive ransomware operations. Operating under a ransomware-as-a-service (RaaS) model, Akira targets small to medium-sized organizations as well as large enterprises, with a strong focus on sectors such as manufacturing, education, healthcare, and professional services. The group [...]

2025-12-16T10:34:17+00:00December 16th, 2025|

Allowlist

An allowlist, also known as a whitelist, is a cybersecurity strategy which approves email addresses, IP addresses, domain names or application, denying access to others. Users can only gain access to the whitelisted items. An allowlist contrasts sharply with a blocklist, which identifies entities that are explicitly denied access. By focusing on what is [...]

2024-11-14T16:17:07+00:00September 1st, 2024|

Antivirus

Antivirus is a program designed to prevent, scan, detect, and remove viruses and other types of malicious software from devices and networks. Key Functions of Antivirus Software Detection: Antivirus software uses various methods to identify malware. This includes signature-based detection, where the software uses a database of known malware signatures to identify threats. [...]

2024-11-14T16:26:51+00:00September 1st, 2024|

Anubis

The Anubis ransomware group is a cybercriminal threat actor that has appeared in multiple forms over recent years, with the most notable incarnation emerging around 2024-2025. Anubis operates as a ransomware-as-a-service (RaaS) group and is known for targeting small to mid-sized organizations, particularly in healthcare, professional services, and manufacturing. The group has gained attention [...]

2025-12-16T10:36:29+00:00December 16th, 2025|

APT73 Ransomware Group

APT73, also known as Bashe, is a ransomware group that emerged in mid-April 2024, self-identifying as an Advanced Persistent Threat (APT). The group has been linked to the LockBit ransomware variant, adopting similar operational tactics and utilizing a TOR-based data leak site for extortion purposes. APT73 has targeted various industries, including finance and technology. [...]

2025-02-13T17:08:33+00:00February 13th, 2025|