A brute-force attack is a recursive trial-and-error method used to determine information such as a user password or personal identification number (PIN).
Cyber Threats and Attacks
The unfortunate reality of being online means you’re usually one click away from encountering a cyber threat. Our Cybersecurity Threats Glossary defines the real-world threats organizations face every day—from phishing and malware to more complex attacks like zero-day vulnerabilities.
Glossary > Cyber Threats and Attacks
Understand Command and Control attacks and how attackers maintain hidden access. Learn common C2 channels, motivations, attack types, and examples.
Cross-site Scripting (XSS) attacks enable attackers to inject client-side scripts into web pages viewed by other users.
A denial-of-service (DoS) is any type of attack where the attackers attempt to prevent legitimate users from accessing the service.
Learn what a DDoS attack is, how it overwhelms systems, and why DDoS incidents continue to rise. Explore key attack types, motivations, and examples.
DGAs let malware generate domains to evade detection and stay hidden. Learn how they work and why DNS visibility is critical for defense.
Learn what fileless malware is, how it works in memory, and why it evades detection. Discover how DNS-layer security helps block these attacks.
Intrusion Detection System is a device or software that monitors a network or systems for malicious activities and reports any incidents.
A keylogger is a technology that tracks and records consecutive keystrokes on a keyboard.
Explore the principle of least privilege and understand its importance in cyber security, ensuring users have minimal access necessary for their roles.
Malware is malicious software that steals data, disrupts systems, or holds them hostage. Learn how it spreads and how to block it with DNS filtering.
MITM attacks intercept data between two parties in real time. Learn how these threats work and what puts your communications at risk.
Phishing tricks users into revealing data through fake emails and sites. Learn how these attacks work and how to reduce your organization’s risk.
Understand how smishing uses text messages to steal data and spread malware. See how DNSFilter protects users from mobile-based phishing threats.
Learn about spear phishing, its types, motivations, effects, & real-world examples. Understand how to protect your organization from these targeted attacks
ZTNA is a cybersecurity strategy that secures organizations by eliminating implicit trust and continuously validating every stage of a digital interaction.
Zero-day attacks exploit unknown flaws before patches exist. Learn how they work, what makes them dangerous, and how to minimize your exposure.


