Advanced Persistent Threat (APT): An APT is a stealthy network breach that is designed to remain undetected for a certain amount of time. APTs are usually used to steal information from a specific individual or organization over time, rather than cause an immediate disruption to operations.
Adware: Adware automatically displays ads on software, particularly web browsers, in an effort to generate revnue for its creator. Adware can often come packaged with free online software, and while it’s not immediately threatening, it can become a severe annoyance and potential security threat. When used as malware, adware can display unwanted (and often embarrassing) advertisements in the form of popups or web ads.
Botnet: A botnet is a collective term used for a network of devices built from “bots”, which are computers controlled remotely by a hacker. Botnets are typically used to complete repetitive tasks, like sending spam messages or participating in Distributed Denial of Service (DDoS) attacks.
Brute-force Attacks: Brute-force attacks are commonly used tactics to break into online accounts, particularly those that take advantage of encryption. A brute-force attack consists of the hacker rapidly inputting as many passwords as possible in an attempt to find the right combination of characters.
Coinminer – see cryptocurrency miners
Command and Control Server: A command and control server (C & C Server) is the central computer that remotely issues commands to botnets and other malware. These botnets and malware will then send information back to the C & C Server, like sensitive data or account credentials.
Cryptocurrency Miners: programs that generate Bitcoin, Monero, Ethereum, or other cryptocurrencies that are surging in popularity. When intentionally run for one’s own benefit, they may prove a valuable source of income. However, malware authors have created threats and viruses which use commonly-available mining software to take advantage of someone else’s computing resources (CPU, GPU, RAM, network bandwidth, and power), without their knowledge or consent (i.e. cryptojacking).
Dictionary Attack: Dictionary attacks utilize known words or phrases in an attempt to crack through passwords and usernames. They can be used in conjunction with brute-force attacks to guess credentials and infiltrate accounts.
Distributed Denial of Service (DDoS): A DDoS attack consists of multiple systems, from varied locations, targeting a single system. The resulting traffic is usually an attempt to bring down a server; forcing it offline until the attack ceases. DDoS attacks are often performed by botnets.
Downloader: A trojan-downloader is a type of trojan that installs itself to the system and waits until an Internet connection becomes available to connect to a remote server or website in order to download additional programs (usually malware) onto the infected computer.
Exploit: A loose definition would be a tool designed for use in exploiting a specific vulnerability within an IT system component, usually for the purpose of staeling data or installing malicious software.
Keylogging: A keylogger could be either a software or a hardware that’s designed to capture and record keystrokes. Software versions of keyloggers are often included in viruses or malware packages to capture credentials for later use. The victim is typically unaware that their activities are being monitored.
Malware: Malware, derived from “malicious software”, is a term used to describe any cyber threat that is intrusive and malicious in nature. This can include any number o fonline threats, including computer viruses, trojans, ransomware, spyware, and others. Malware is usually activated through the use of executable code or scripts. Basically, anything that has malicious intent can be considered malware.
Phishing: Phishing tactics are used by hackers to lure targets into handing over sensitive credentials, like usernames, passwords, credit card numbers, social security numbers, and so on, usually through email spam tactics or other electronic means. Phishing tactics will often masquerade as a trusting or intimidating entity.
Ransomware: Ransomware is a type of malware that attempts to extort money or credentials from users by locking down local files on their PC or workstation, usually through the use of encryption technology. The user may (or may not) receive the decryption key upon giving in to the hacker’s demands.
SMiShing: A security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his cellular phone or other mobile device. SMiShing is short for “SMS phishing.”
Social Engineering: Social engineering is a tactic used by hackers that appeals to the weakness of the end user. Hackers find ways to circumvent common security protocols by posing as important officials or users within a company, or even as an internal IT department. Social engineering tactics are cause for concern primarily because they target the unpredictable nature of human activity.
Spam: Spam is mostly known as the time-wasting emails that users receive on a daily basis. Technically, spam can be any unsolicited or unwanted message sent to your email address. These messages may not seem overtly malicious, but hackers will often use spam to achieve a certain agenda. Spam messages might come with malicious links or attachments, that when clicked on can execute code or send you to compromised websites.
Spear Phishing: Spear phishing tactics are focused phishing attempts on an individual, customized to appear as legitimate as possible. An example would be a local bank representative calling or sending an email asking to confirm credit card numbers or credentials.
Spoofing: Spoofing is the act of tricking users into believing that they’re viewing something legitimate, when in reality they’re looking at a fake. For example, email spoofing is a common tactic in which hackers will pose as someone from your contacts, but will have the wrong email address. Another example would be clicking a link and being directed to a website that looks like the one you want to view, but the domain name is wrong.
Spyware: Spyware is a type of malware that’s designed to covertly gather information from a computer, and transfer that information to a hacker. Spyware can be difficult to identify because it is specifically designed to remain hidden.
Trojan: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: Deleting data, Blocking data, Modifying data, Copying data and Disrupting the performance of computers or computer networks. Unlike computer viruses and worms, Trojans are not able to self-replicate. Trojans are often used in conjunction with advanced persistent threats (APT) in an attempt to gather as much information as possible, while remaining hidden from security protocol.
Virus: A virus is a malware program that, when executed, attempts to replicate itself and spread to other computer components. Viruses are often disruptive and dangerous, especially in the business environment. They can slow business systems, delete critical data, and much more.
Vishing (voice or VoIP phishing): An electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities. A vishing attack can be conducted by voice email, VoIP (voice over IP), landline or cellular telephone.
Vulnerability: A vulnerability is a bug or a problem within the code of an operating system or other software that needs to be fixed. Vulnerabilities leave networks open to potential threats, and are often resolved by patches and security updates issued by software manufactures.
Zero-Day Exploits: A zero day exploit is a cyber attack that occurs on the same day a weakness is discovered in software. At that point, it’s exploited before a fix becomes available from its creator.