BlackFog Logo

Cybersecurity 101

A B C D E F G H I K L M N O P Q R S T U V W Z

Safepay

The SafePay ransomware group is a relatively new threat actor operating within the modern ransomware ecosystem as a financially motivated extortion group. SafePay has been observed targeting small to mid-sized organizations across multiple industries, often focusing on victims with exposed services or limited defensive maturity. SafePay uses a double extortion approach, encrypting systems while also [...]

2025-12-16T14:34:52+00:00December 16th, 2025|

Sandboxing

In cybersecurity, sandboxing is a using a test environment, which mimics that of an end-user, to run programs or open files without affecting network, platform or system. This is used to test potentially malicious software.

2023-07-05T15:31:43+01:00July 5th, 2023|

Scareware

Scareware is an evolution of older, social engineering-based attacks that aim to trick users into paying to fix a non-existent problem with their machine.

2024-11-20T16:32:53+00:00July 26th, 2022|

Service Level Agreement (SLA)

A service level agreement (SLA) is part of a contract that sets the expectations between the service provider and the customer and will define and document what services will be provided and the required level or standard for those services.

2023-07-06T08:10:48+01:00July 6th, 2023|

Shadow AI

What is Shadow AI? Shadow AI refers to the use of artificial intelligence tools, models, or AI-powered platforms within an organization without the approval, oversight, or governance of IT and cybersecurity teams. Similar to shadow IT, Shadow AI occurs when employees adopt generative AI tools, AI assistants, or machine learning applications independently to improve [...]

2026-03-05T10:10:21+00:00March 5th, 2026|

SIEM

Security Information and Event Management (SIEM) is an approach to security management that combines security information management and security event management functions into one centralized security management system.

2023-07-06T08:18:37+01:00July 6th, 2023|

Signature-Based Threat

What is a Signature-Based Threat? A signature-based threat refers to a cyberthreat that can be identified by matching its characteristics against a known pattern or “signature” stored in a security system’s database. In cybersecurity, a signature acts as a unique digital fingerprint of malicious activity such as malware code, exploit patterns, or suspicious network [...]

2026-03-05T10:57:01+00:00March 5th, 2026|

Sinobi

The Sinobi ransomware group is a newly emerging threat actor. Available intelligence suggests Sinobi is likely an early-stage or opportunistic group, possibly leveraging reused or modified ransomware tooling rather than developing bespoke malware. Sinobi’s attacks appear to focus on quick-impact extortion, combining data encryption with the threat of data exposure to pressure victims into paying. [...]

2025-12-16T15:21:58+00:00December 16th, 2025|

Smishing

Smishing is a form of phishing in which the attacker sends "fake" mobile text messages to trick targeted recipients into downloading malware, sharing sensitive information or sending money to the cybercriminals.

2023-07-06T08:11:22+01:00July 6th, 2023|

Social Engineering Attacks

Social engineering is manipulation technique, relying heavily on human interaction and error to gain access to private information, networks and other valuable assets. These attacks are based around how people think and play on their emotions - when a hacker understands what motivates a user's actions, they can deceive and manipulate them. There are [...]

2022-09-23T21:56:33+01:00September 21st, 2022|