BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Ethical Hacker

Also known as a "white hat" hacker, an ethical hacker is a security expert who is called in to uncover security vulnerabilities which threat actors could exploit. They are responsible for evaluating the security of systems, networks or system infrastructures and identify vulnerabilities and attempt to exploit problems that could cause unauthorized access to [...]

2022-09-23T21:52:37+01:00September 21st, 2022|

Extended Detection and Response (XDR)

Extended Detection and Response (XDR) solutions provide extended visibility, analysis and response across endpoints, networks, cloud and applications. This technology applies analytics and automation to detect, analyse, hunt, and remediate threats. DR is designed to overcome the limitations of traditional security solutions by providing a unified platform that correlates data from various sources to [...]

2024-11-11T14:03:51+00:00March 7th, 2023|

Extortion

Extortion refers to the act of coercing an individual or organization into providing money, services, or other valuable assets by threatening to cause harm to their digital assets, reputation, or sensitive data. This threat may involve various forms of cybercrime, including data breaches, service disruption, or the release of confidential information. Cyber extortion is [...]

2024-11-11T14:10:21+00:00March 8th, 2023|

File Pumping

File pumping is a technique used by malware and ransomware that is used to artificially inflate the size of a file by injecting it with additional bytes to bypass cybersecurity tools.

2024-11-11T14:14:28+00:00January 20th, 2024|

Firewall

A firewall is a network security device that monitors and filters incoming and outgoing traffic based on an organization's defined security rules, protecting networks from unauthorized access to private data. It acts as a barrier between a trusted internal network (such as a corporate or private network) and untrusted external networks (such as the [...]

2024-11-11T15:16:58+00:00March 8th, 2023|

Firmware

Firmware is a type of software embedded into hardware devices that provides basic machine instructions to control their functionality and communicate with other software running on the device. Firmware is often considered the bridge between the hardware and the higher-level software (such as operating systems or applications) that interacts with the hardware. Unlike traditional [...]

2024-11-11T15:21:39+00:00July 5th, 2023|

Funksec

FunkSec is a relatively new ransomware group that emerged in late 2024, quickly gaining notoriety for its high volume of attacks and distinctive tactics.

2025-02-13T16:27:06+00:00February 13th, 2025|

General Data Protection Regulation (GDPR)

The EU General Data Protection Regulation (GDPR) is a significant piece of European legislation that came into force on May 25, 2018. It builds on existing data protection laws, strengthening the rights that EU individuals have over their personal data, and creating a single data protection approach across Europe.

2022-09-23T21:52:53+01:00July 19th, 2022|

Hacktivism

Hacktivism is the act of hacking, misusing or breaking into a computer system or network for socially or politically motivated reasons.

2024-11-11T15:26:40+00:00September 21st, 2022|

Honeypot

A honeypot is a cybersecurity mechanism which uses a network-attached system to act as a decoy in order to lure cybercriminals and detect, deflect and study their hacking attempts while they attempt to gain unauthorized access to the network. How do honeypots work? Generally, a honeypot operation consists of a computer, applications and [...]

2024-11-11T15:28:48+00:00July 5th, 2023|