BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Threat Hunting

Threat hunting is the process of proactively searching for cyberthreats within an organization by using methodology, innovative technology and threat intelligence. The Process of Threat Hunting Threat hunting involves a series of steps: Theory Development: Threat hunters begin by forming theories and hypotheses based on their existing knowledge of threats, threat behaviors, vulnerabilities and [...]

2024-10-11T14:08:44+01:00July 6th, 2023|

Threat Intelligence

Threat intelligence is the gathering and analysis of cybersecurity data to understand threats that have, will or are currently targeting an organization. The process encompasses data gathered from various sources, which then influences actionable insights to enhance an organization's ability to prevent, detect and respond to cyberthreats. Key Components of Threat Intelligence Data [...]

2024-10-11T14:09:22+01:00July 6th, 2023|

Trojan

A Trojan, or Trojan Horse, is a type of malware which disguises itself as legitimate code or software to mislead the user. Characteristics of a Trojan Trojans do not self-replicate like worms or other viruses. Instead they depend on social engineering techniques to trick users into executing the malicious software. Common methods include [...]

2024-10-11T14:10:06+01:00March 8th, 2023|

Two-Factor Authentication (2FA)

Two-Factor Authentication (2FA) is a security process used to verify users' identities and provide an additional layer of account security. The user will be asked to provide two different authentication factors to verify themselves and access online accounts.

2024-10-11T12:06:25+01:00March 8th, 2023|

Virtual Private Network (VPN)

A virtual private network (VPN) is a service that provides a secure internet connection by creating an encrypted "tunnel" for your data, protecting your online identity by hiding your IP address and allowing you to use public Wi-Fi safely. People use VPNs when using public Wi-Fi regularly, if they want to access home content [...]

2024-10-10T12:19:51+01:00September 21st, 2022|

Virus

CISA defines a virus as a malicious program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. A virus infecting devices or networks can often lead to detrimental effects, including data corruption, unauthorized access, and system instability. Unlike other [...]

2024-10-10T12:13:15+01:00July 6th, 2023|

Vishing

Vishing is short for "voice phishing," a type of cyberattack which involves fraudulent use of phone calls or voice messages to steal confidential information from victims. How Vishing Works Vishing involves an attacker impersonating a legitimate, usually trusted, entity, such as a bank, government agency or trusted authority. The goal of the attacker [...]

2024-10-09T16:35:24+01:00July 6th, 2023|

Vulnerability

In cybersecurity, a vulnerability is a weakness or flaw in an IT system, application or network that can be exploited by an attacker to gain unauthorized access, disrupt operations, or compromise data integrity. Vulnerabilities can exist in various forms, including software bugs, misconfigurations, or insufficient security measures, and they pose significant risks to organizations [...]

2024-10-14T13:51:03+01:00March 8th, 2023|

Whaling

Whaling is a highly targeted phishing method used by cybercriminals who masquerade as a senior executive in an organization and directly target other senior or important individuals within that organization. The aim is to steal money, access sensitive information or gain access to computer networks and systems. How whaling works The aim of [...]

2024-10-14T13:47:15+01:00March 8th, 2023|