BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Access Brokers

Access brokers (also known as initial access brokers) are criminal groups who specialize in selling illegitimate access to corporate networks. These groups breach the networks and then sell the access on to ransomware and other cybercriminal groups.

2024-11-14T16:13:16+00:00September 1st, 2024|

Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an intruder, or team of intruders, gain access to a network using sophisticated hacking techniques, and remain undetected for an extended period of time.

2024-11-14T16:07:03+00:00September 1st, 2024|

Adware

Adware is a type of malware that displays unwanted pop up advertisements on your computer or device. Adware is commonly activated unknowingly when a user is trying to install legitimate applications that the adware is bundled with. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly [...]

2024-11-14T16:14:00+00:00September 1st, 2024|

Allowlist

An allowlist, also known as a whitelist, is a cybersecurity strategy which approves email addresses, IP addresses, domain names or application, denying access to others. Users can only gain access to the whitelisted items. An allowlist contrasts sharply with a blocklist, which identifies entities that are explicitly denied access. By focusing on what is [...]

2024-11-14T16:17:07+00:00September 1st, 2024|

Antivirus

Antivirus is a program designed to prevent, scan, detect, and remove viruses and other types of malicious software from devices and networks. Key Functions of Antivirus Software Detection: Antivirus software uses various methods to identify malware. This includes signature-based detection, where the software uses a database of known malware signatures to identify threats. [...]

2024-11-14T16:26:51+00:00September 1st, 2024|

Attack Vector

An attack vector is the pathway or method that a hacker takes to illegally access a network or computer in an attempt to exploit cybersecurity vulnerabilities. Understanding attack vectors is crucial for cybersecurity professionals, as it helps to develop effective strategies to protect themselves from potential threats. Types of Attack Vector Malware Delivery: [...]

2024-10-23T15:13:41+01:00July 6th, 2023|

Backdoor

A backdoor in cybersecurity is an undocumented way of gaining access to a computer system or network, bypassing an organization's existing security solutions and defenses. Backdoors can be intentionally created by developers for legitimate processes, such as facilitating remote access for system maintenance or trouble shooting. However, backdoors are often exploited by cybercriminals to [...]

2024-10-23T16:03:22+01:00July 5th, 2023|

Baiting

Baiting is a social engineering attack that entices individuals into taking an action that compromises their security or exposes sensitive information. This technique often involves enticing a target with a promise of something desirable, such as free software, exclusive access or other attractive incentives, to manipulate them into engaging with malicious content or revealing [...]

2024-11-06T14:14:48+00:00July 6th, 2023|

Baselining

Baselining is the process of creating a reference point or standard for the normal operations and performance of an organization's network, systems and security protocols. This reference point, known as a baseline, serves as a benchmark against which all future activities and systems behaviors will be compared to. This goal of baselining is to [...]

2024-11-06T14:55:38+00:00July 5th, 2023|