BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Social Engineering Attacks

Social engineering is manipulation technique, relying heavily on human interaction and error to gain access to private information, networks and other valuable assets. These attacks are based around how people think and play on their emotions - when a hacker understands what motivates a user's actions, they can deceive and manipulate them. There are [...]

2022-09-23T21:56:33+01:00September 21st, 2022|

Split Tunneling

Split tunneling allows organizations to divide internet connections into two separate streams. This method will route organization specific data through a VPN tunnel, but routes other traffic through the remote user's default gateway. While split tunneling offers benefits in terms of flexibility and bandwidth efficiency, it also introduces significant security risks. How Split [...]

2024-11-11T12:27:34+00:00July 6th, 2023|

Spoofing

Spoofing is when a threat actor disguises a communication or activity from a malicious source and presents it as from a familiar or trusted source in an attempt to gain the target's confidence, get access to systems, steal data, steal money or spread malware. Spoofing can manifest in various forms, including email spoofing, IP [...]

2024-11-11T12:09:40+00:00March 8th, 2023|

Spyware

Spyware is software that is installed into a computer device, without the end user’s knowledge, in order to gather data and sensitive information and is currently one of the most common threats to internet users. This type of malware infects your PC or mobile in order to gather information including sites you visit, what [...]

2024-11-11T12:02:16+00:00September 21st, 2022|

Tailgating

Tailgating is a social engineering attack enabling an unauthorized individual to gain access to a password-protected or secured premise by following an authorized individual. This threat occurs when a malicious actor or intruder uses the legitimate entry of a trusted person to bypass security protocols, such as locked doors, access-controlled areas, or secure buildings. [...]

2024-11-11T12:00:19+00:00July 6th, 2023|

The Dark Web

The Dark Web is an anonymous network that can only be accessed by browsers such as Tor. By content alone it is larger than the standard indexable Web that we use everyday by about 50% and represents approximately 6% of all sites.

2024-11-11T11:52:37+00:00July 19th, 2022|

Threat Actor

A threat actor, also known as malicious actor, is any individual, group or organization that intentionally poses a threat to cybersecurity. These actors seek to exploit vulnerabilities in order to cause harm, steal information, disrupt services, or achieve other malicious objectives. Understanding who threat actors are, their motives, tactics, and methods is essential for [...]

2024-11-11T11:43:14+00:00March 8th, 2023|

Threat Analysis

Threat analysis aims to assess an organization's security processes and procedures to identify threats and vulnerabilities within their network. This practise usually mixes vulnerability testing with risk assessments to better understand the potential real world threats that a network can face. A comprehensive threat analysis can help organizations to prepare for and respond to [...]

2024-11-11T11:37:24+00:00March 8th, 2023|

Threat Assessment

A threat assessment in cybersecurity is a set of processes or tools used to identify, evaluate and prioritize perceived threats to an organization's digital assets. It involves understanding the likelihood of different types of cyber threats, their potential impact on the organization, and developing strategies to mitigate or respond to these risks effectively. The [...]

2024-11-11T11:29:12+00:00July 6th, 2023|