Cyber Threats and Attacks

The unfortunate reality of being online means you’re usually one click away from encountering a cyber threat. Our Cybersecurity Threats Glossary defines the real-world threats organizations face every day—from phishing and malware to more complex attacks like zero-day vulnerabilities.

 

Glossary > Cyber Threats and Attacks

A brute-force attack is a recursive trial-and-error method used to determine information such as a user password or personal identification number (PIN).
C2 Server is a component of a malware attack that establishes a remote channel between a compromised host and the attacker’s server. 
Learn what fileless malware is, how it works in memory, and why it evades detection. Discover how DNS-layer security helps block these attacks.
A keylogger is a technology that tracks and records consecutive keystrokes on a keyboard.
Explore the principle of least privilege and understand its importance in cyber security, ensuring users have minimal access necessary for their roles.
Malware is malicious software that steals data, disrupts systems, or holds them hostage. Learn how it spreads and how to block it with DNS filtering.
MITM attacks intercept data between two parties in real time. Learn how these threats work and what puts your communications at risk.
Phishing tricks users into revealing data through fake emails and sites. Learn how these attacks work and how to reduce your organization’s risk.
Understand how smishing uses text messages to steal data and spread malware. See how DNSFilter protects users from mobile-based phishing threats.
Zero-day attacks exploit unknown flaws before patches exist. Learn how they work, what makes them dangerous, and how to minimize your exposure.