Cyber Threats and Attacks

The unfortunate reality of being online means you’re usually one click away from encountering a cyber threat. Our Cybersecurity Threats Glossary defines the real-world threats organizations face every day—from phishing and malware to more complex attacks like zero-day vulnerabilities.

 

Glossary > Cyber Threats and Attacks

A brute-force attack is a recursive trial-and-error method used to determine information such as a user password or personal identification number (PIN).
C2 Server is a component of a malware attack that establishes a remote channel between a compromised host and the attacker’s server. 
Cross-site Scripting (XSS) attacks enable attackers to inject client-side scripts into web pages viewed by other users.
A denial-of-service (DoS) is any type of attack where the attackers attempt to prevent legitimate users from accessing the service.
DDoS attack involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
Fileless malware is a variant of computer related malicious software that exists exclusively in a computer’s memory (RAM).
Intrusion Detection System is a device or software that monitors a network or systems for malicious activities and reports any incidents.
A keylogger is a technology that tracks and records consecutive keystrokes on a keyboard.
Explore the principle of least privilege and understand its importance in cyber security, ensuring users have minimal access necessary for their roles.
Malware is malicious software that steals data, disrupts systems, or holds them hostage. Learn how it spreads and how to block it with DNS filtering.
MITM attacks intercept data between two parties in real time. Learn how these threats work and what puts your communications at risk.
Phishing tricks users into revealing data through fake emails and sites. Learn how these attacks work and how to reduce your organization’s risk.
ZTNA is a cybersecurity strategy that secures organizations by eliminating implicit trust and continuously validating every stage of a digital interaction.
Zero-day attacks exploit unknown flaws before patches exist. Learn how they work, what makes them dangerous, and how to minimize your exposure.