BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Access Brokers

Access brokers (also known as initial access brokers) are criminal groups who specialize in selling illegitimate access to corporate networks. These groups breach the networks and then sell the access on to ransomware and other cybercriminal groups.

2024-11-14T16:13:16+00:00September 1st, 2024|

Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an intruder, or team of intruders, gain access to a network using sophisticated hacking techniques, and remain undetected for an extended period of time.

2024-11-14T16:07:03+00:00September 1st, 2024|

Adware

Adware is a type of malware that displays unwanted pop up advertisements on your computer or device. Adware is commonly activated unknowingly when a user is trying to install legitimate applications that the adware is bundled with. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly [...]

2024-11-14T16:14:00+00:00September 1st, 2024|

Allowlist

An allowlist, also known as a whitelist, is a cybersecurity strategy which approves email addresses, IP addresses, domain names or application, denying access to others. Users can only gain access to the whitelisted items. An allowlist contrasts sharply with a blocklist, which identifies entities that are explicitly denied access. By focusing on what is [...]

2024-11-14T16:17:07+00:00September 1st, 2024|

Antivirus

Antivirus is a program designed to prevent, scan, detect, and remove viruses and other types of malicious software from devices and networks. Key Functions of Antivirus Software Detection: Antivirus software uses various methods to identify malware. This includes signature-based detection, where the software uses a database of known malware signatures to identify threats. [...]

2024-11-14T16:26:51+00:00September 1st, 2024|

Attack Vector

An attack vector is the pathway or method that a hacker takes to illegally access a network or computer in an attempt to exploit cybersecurity vulnerabilities. Understanding attack vectors is crucial for cybersecurity professionals, as it helps to develop effective strategies to protect themselves from potential threats. Types of Attack Vector Malware Delivery: [...]

2024-10-23T15:13:41+01:00July 6th, 2023|