Cybersecurity Knowledge Hub

Basic Cybersecurity
Terms and Types

Click one of the letters below to automatically scroll down to terms beginning with that letter:

Account Takeover

Account takeover is a type of fraud in which a cybercriminal gains unauthorized access to a victim’s online account.

Affiliate fraud

Read about how iGaming affiliate fraud operates, what malicious signs to watch out for, and how to prevent it with Group-IB Fraud Protection

Antidetect browsers

An antidetect browser is a tool based on popular web browsers and designed to conceal a user’s actual digital identity and make it more difficult for websites to track them.

APT

The term APT refers to an advanced persistent threat or an attack group. This, however, is not just a single attack, but a set of attacks over a period of time. The nature of these attacks is stretched and they’re conducted in multiple phases due to the fact that the attackers use sophisticated tactics and means of hiding their activities, as well as unique tools so that the victim does not notice the presence of the attacker in the network. In addition to that, the attackers can use zero-day exploits as well.

Attack Surface Management

Explore Attack Surface Management: definition, importance, and strategies. Protect your organization’s assets with Group-IB ASM.

Blue Team

Discover the importance of a Blue Team for your business’s cybersecurity. Learn about assessing cyber risks, methodologies, exercises, tools, and building a strong defense.

Bonus abuse fraud

Uncover Bonus Abuse Fraud: Understand how it operates, common tactics, prevention tips, and how Group-IB offers assistance.

Botnet

A botnet is a network of compromised computers that are remotely controlled to carry out malicious activities, such as spamming, distributed denial-of-service (DDoS) attacks, data theft, accessing confidential information, etc. An automated bot attack is also used to disrupt client-facing assets such as websites, apps, and APIs.

Breach

A data breach is a security incident that compromises computer data, systems, applications, and devices and exposes sensitive, confidential, or protected information without the authorization of the organization.

Business Email Compromise

Email is the most conventional and a prime channel of communication for both internal and external exchange of information in any organziation. This, unequivocally, also makes it the no.1 attack vector, and a favourable means for adversaries to acccess your network.

Card Shop

In cybersecurity, a card shop is a type of underground market that sells specific types of data – dumps and bank card credentials (СС). Card credentials are data in text format that may include card number, card expiration date, cardholder name, address, and CVV. Dumps stand for the contents of the magnetic strip of bank cards. 

CERT

In cybersecurity, CERT stands for computer emergency response team – a team of information security analysts tasked with cyber incident detection, response, prevention, and reporting.

CIRC

The term CIRC stands for computer incident response center or capability.

CIRT

Discover CIRT’s role, differences from CERT, CIRC, SOC, and the value of third-party providers in incident response. Your go-to guide.

Cloud jacking

Protect against cloud jacking: definition, main attack vectors, and defense solutions

Credential stuffing attacks

Shield your business from Credential Stuffing: Learn what it is, prevention, and how Group-IB can help safeguard your data.

Credit Card Fraud

Learn about credit card fraud and ways to protect yourself.

Crypto Wallet Drainers

Learn all about crypto wallet drainers – malicious tools that steal digital assets from unsuspecting users and how to protect your cryptocuyrrency.

CSIRC

CSIRC or the Computer Security Incident Response Center is a specialized department responsible for managing and reacting quickly and efficiently to information security incidents within an organization.

What is Cybercrime?

Learn what cybercrime is, its impact on society, and how to protect your business. ✓ Explore proactive tips and solutions to keep your business safe.

Dark Web

Demystifying the Dark Web: Types of cybercrimes, access, and safeguarding your business with Group-IB’s protection.

Data Lake

A data lake is a centralized repository that allows you to store all your structured and unstructured data at scale.

Data Leak

Understand data leaks’ risks and prevention. Explore types, impacts, and monitoring solutions with Group-IB.

Data Loss Prevention

Want to learn about what Data Loss Prevention (DLP) is? ✓ Discover how DLP works, why it’s important, the various types of DLP security, and features to look for.

Dedicated Leak Sites

A Dedicated Leak Site (DLS) is a website where the illicitly retrieved data of companies, that refuse to pay the ransom, are published.

Deep Web

The deep web, also called the invisible web, is a part of the internet that isn’t indexed, and therefore, cannot be accessed through traditional web browsers such as Google, Bing, or Yahoo.

Deepfakes

Discover the inner workings of deepfakes, from face swaps to voice attacks, and learn how to spot deep fakes before they can cause any harm.

Digital forensics

Explore Digital Forensics: components, tools, and discover Group-IB’s digital forensics services.

Digital Forensics and Incident Response

Unlocking Digital Forensics and Incident Response: Its scope, importance, choosing providers, and DFIR expertise with Group-IB.

Distributed denial of service (DDoS) attacks

Learn more about the dangers of DDoS and discover existing options to defend your digital resources from being flooded by attackers

eDiscovery

Explore eDiscovery: definition, process, and use cases. Learn about DFIR integration, presenting evidence, and Group-IB’s eDiscovery services.

EDR (Endpoint Detection and Response)

The endpoint detection and response definition boils down to the following: EDR is a class of cybersecurity solutions for detection and analysis of malicious activity on endpoints, e.g., workstations, servers, and so on.

Hacktivism

Hacktivism (a combination of the terms “hacking” and “activism”) – hacker activity performed with political or social purposes, such as drawing attention to conflict or promoting specific ideas. Unlike regular cybercriminals, hacktivists do not seek financial or other personal gain.

Identity and access management (IAM)

Mastering Identity and access management: System, components, importance, and optimizing IAM with Group-IB for your organization.

Identity providers (IdP)

Discover integrating Identity Providers & XDR for robust cloud security. Simplify access, fortify authentication, and detect threats proactively!

Identity security

Secure your business with Group-IB’s IAM solutions. From passwordless access to expert consulting, fortify defenses against cyber threats. Align identity security with your business goals effectively.

Impersonation scams

Learn about the key scenarios used in impersonation scams, the risks facing organizations, and what you can do to protect yourself

Incident Response

Incident response is a complex multi-step process of identifying, localizing, and eliminating cybersecurity incidents.

Indicators of Attack (IOAs)

Unlock proactive defense with combined IOA and IOC strategies. Explore Group-IB’s cybersecurity solutions leveraging IoAs for early threat detection, adaptive defense, and comprehensive coverage against evolving cyber threats.

Indicators of Compromise (IOCs)

Decoding Indicators of Compromise: Types, prevention, IOCs vs. IOAs, risk assessment, and managing IOCs with Group-IB.

Insurance impersonation scams

Learn how impersonation fraud threatens insurance companies and how to protect your customers.

Intrusion Detection and Prevention Systems (IDS/IPS)

Intrusion detection and prevention systems (IDS/IPS) are security systems designed to detect and protect against unauthorized access to companies’ infrastructure.

IT vs. OT in Cybersecurity

Explore the differences and similarities between IT vs. OT in cybersecurity. Learn about their convergence, and the resulting benefits and implications of it.

Malware

Malware or malicious software is a blanket term for code, or scripts, created to disrupt the functioning of a system.

Malware detonation platform (MDP)

Malware detonation platform is an essential tool for malware analysis.

Managed Detection and Response (MDR)

Unveiling the power of Managed Detection and Response: MDR vs. MSSP, critical process steps, provider benefits, and experiencing MDR with Group-IB.

Managed services (MS)

The term managed IT services stands for the practice of delegating a part of the typical functions of an IT department to a third party – a managed service provider (MSP).

Multi-Factor Authentication (MFA)

Elevate Cybersecurity with Multi-Factor Authentication: Learn what it is, its importance, users, protection, and secure access with Group-IB Fraud Protection.

NDR (Network detection and response)

Network detection and response (NDR) is a class of solutions dedicated to monitoring and analyzing network traffic for malicious and suspicious activities and responding in case of detected cyber threats in the network.

Network traffic analysis (NTA)

Network traffic analysis (NTA) is a method of monitoring network traffic for the purpose of identifying malicious activity or other issues with the network caused by application bottlenecks, connectivity issues, and so on.

Overlay attacks

Explore Overlay Attacks: Learn the risks, Android overlays, techniques, protection, and Group-IB’s solutions to safeguard your data.

Pass the hash

Pass the hash is an attack method that allows cybercriminals to use a password hash instead of the password itself to access resources within the network.

Password spraying

Unlocking Password Spraying Attacks: Learn the differences, impacts, detection, prevention, and Group-IB’s protective solutions.

Passwordless authentication

Discover the Future of Authentication: Passwordless methods, benefits, implementation, and best practices in this comprehensive guide.

Patch Management

Patch management is the process of finding, obtaining, testing, and installing patches – changes to the source code added to fix bugs, plug security vulnerabilities, or add new functionality to the software solution.

Penetration Testing

A penetration test (or pentest) is an imitation of a cyberattack against a system in order to identify weaknesses that threat actors could use to their advantage.

Phishing

Phishing is a form of social engineering that implies tricking victims into disclosing sensitive data, such as payment card credentials, logins and passwords for specific accounts, password phrases for crypto wallets, etc.

Port 3389

Learn how port 3389 enables secure Remote Desktop Protocol (RDP) access. Discover its functions, security risks, and 8 best practices for maximizing protection.

Purple team

Purple team is a term for a blend of a red team and blue team. In contrast to the red teaming approach, purple teaming implies the collaborative work of “attackers” and “defenders”.

RaaS

RaaS is a business model where individuals (operators) develop and distribute the malware, and pay the third parties for traffic generation and malware downloads to victim machines.

Ransomware

Ransomware attacks are one of the most-persistent global cyber threats, and are becomming even more sophisticated with each year.

Red Teaming

Red teaming involves simulating a cyberattack in order to comprehensively assess what the customer company’s security specialists do and to examine the processes and technologies used for protecting the company’s IT infrastructure.

Remote Access Trojan (RAT)

Protect your system from Remote Access Trojans (RATs). Learn how RATs work, common symptoms, and security practices to defend against these cyber threats.

Shop
Wishlist
0 items Cart
My account