Cyber Threats and Attacks

The unfortunate reality of being online means you’re usually one click away from encountering a cyber threat. Our Cybersecurity Threats Glossary defines the real-world threats organizations face every day—from phishing and malware to more complex attacks like zero-day vulnerabilities.

 

Glossary > Cyber Threats and Attacks

A brute-force attack is a recursive trial-and-error method used to determine information such as a user password or personal identification number (PIN).
C2 Server is a component of a malware attack that establishes a remote channel between a compromised host and the attacker’s server. 
Fileless malware is a variant of computer related malicious software that exists exclusively in a computer’s memory (RAM).
A keylogger is a technology that tracks and records consecutive keystrokes on a keyboard.
Explore the principle of least privilege and understand its importance in cyber security, ensuring users have minimal access necessary for their roles.
Malware is malicious software that steals data, disrupts systems, or holds them hostage. Learn how it spreads and how to block it with DNS filtering.
MITM attacks intercept data between two parties in real time. Learn how these threats work and what puts your communications at risk.
Phishing tricks users into revealing data through fake emails and sites. Learn how these attacks work and how to reduce your organization’s risk.
Zero-day attacks exploit unknown flaws before patches exist. Learn how they work, what makes them dangerous, and how to minimize your exposure.