Cybersecurity Glossary
Learn about the latest cybersecurity attacks, threat actors, best practices, regulations, and beyond.
Get a Demo
Abuse Mailbox
An Abuse Mailbox is the destination of user-reported suspicious emails sent to IT and security teams for further evaluation. It's a crucial part of tracking and stopping potential email threats.
Read More
Account Takeover Fraud
Account takeovers happen when cybercriminals steal login credentials to access an email account. If a malicious actor successfully compromises an account, they can use it to commit fraud, send phishing emails, steal data, and beyond.
Read More
AI-Enabled Cyberattacks
An AI-powered cyberattack, also known as an AI-enabled or offensive AI attack, leverages AI/ML algorithms to carry out malicious activities. These attacks use AI to automate and enhance the capabilities of traditional cyberattacks, making them more sophisticated, targeted, and challenging to detect.
Read More
Bad Rabbit Ransomware
Bad Rabbit is a notable ransomware attack from 2017 where a file was maliciously installed through a bogus Adobe Flash installer. It encrypted user data and requested a Bitcoin ransom payment, with a similar code structure to the Petya attack. Bad Rabbit originated in Russia and Ukraine, and was spotted in several other countries.
Botnet
A botnet (bot network) is a chain of Internet-connected devices centrally controlled by a hacker. Botnets are usually created by hijacking unsuspecting computers with malware, and they’re often used to send spam or DDoS attacks.
Brute Force Attack
A brute force attack refers to a trial-and-error attempt to steal passwords, login credentials, and encryption keys. Brute force attacks are conducted manually or, more often, with the help of a computer. There are several effective defenses against these attacks–increasing password length, requiring CAPTCHA answers, or limited password attempts.
Read More
Business Email Compromise (BEC)
BEC is currently the most expensive type of cybercrime. These socially engineered attacks evade traditional email security systems. Learn how and why BEC works, and how to stop it.
Read More
Clone Phishing
Clone phishing occurs when attackers create a convincing clone of a legitimate email. They compromise or impersonate the original sender and use the copycat email to dupe victims into entering login credentials, paying an invoice, downloading malware, or sharing sensitive data. These emails are often identical to a previous email the victim has received, except a malicious attachment or link is included.
Read More
Cloud Access Security Broker (CASB)
A cloud access security broker (CASB) is a security policy that sits between cloud service providers and users. A wide ranging CASB can authenticate users, help monitor and stop suspicious activity, prevent malware, and more.
Read More
Cloud Email
Cloud-based email is an email delivery and storage method hosted and maintained by an outside provider. It allows organizations and users to securely send, receive, and store emails. This is unlike on-premise email hosting which is physically housed and maintained internally within an organization's servers and IT environment.
Read More
Cloud Security Posture Management (CSPM)
Cloud Security Posture Management (CSPM) is a set of tools and processes designed to keep cloud-based environments secure by identifying misconfigurations and enforcing security policies.
Read More
Compliance Monitoring
In cybersecurity, compliance monitoring refers to evaluating security processes for adherence to legal and internal regulations. Certain industries and regions have specific cybersecurity standards. Compliance monitoring helps organizations ensure they operate legally, protect their data, and avoid potential fines.
Computer Virus
A computer virus is a program, software, or piece of code designed to negatively affect the device or network it infects. They’re spread by malware, phishing scams, social engineering, or virtually any cyberattack method.
Consent Phishing
Consent phishing is a specialized type of phishing targeting user permissions for third-party applications. Third-party apps frequently ask permission to access certain features to run properly. But attackers can use fraudulent app permission requests to gain access to a person's account.
Read More
Credential Stuffing
Credential stuffing uses stolen login credentials and across multiple websites, using bots for mass log-in attempts.
Read More
Cryptojacking
Cryptojacking is the use of a device to mine cryptocurrency, without the device owner’s knowledge or permission. It’s usually done by installing malware on an unsuspecting victim’s device, like a computer, phone, or tablet. Mining cryptocurrency requires substantial resources, which makes cryptojacking useful for criminals.
Cyberattack
A cyberattack is a wide-ranging term for a malicious attempt to breach networks, systems, or computer infrastructure of an individual or organization. Cyberattacks can take a variety of forms and can come from single actors or organized groups.
Cybersecurity
Cybersecurity is a catch-all term for the practice of securing systems, networks, and technologies from attacks and unauthorized access. A strong cybersecurity policy is vital to every modern organization.
Data Archive
A data archive is the removal and safe storage of data that remains important or sensitive but is no longer regularly used. It’s an important practice for organizations with data compliance or forensics requirements.
Read More
Data Breach
A data breach occurs when confidential and sensitive information is stolen by an unauthorized group or individual. Data breaches are one of the end goals of many cyberattacks.
Read More
Data Loss Prevention (DLP)
Data loss prevention refers to a set of software and processes that work to prevent breaches and unauthorized access of sensitive data. DLP is a critical component in protecting and securing data.
Read More
Denial-of-Service (DoS) Attack
A DoS attack is a common cyberattack where a server, machine, or network is maliciously rendered unusable by a service crash or a flood of requests. DoS attacks prevent legitimate users from accessing the service, usually by overloading it with bogus traffic. These attacks can quickly crash a website.
Distributed Denial-of-Service (DDoS) Attack
A DDoS attack is a cyberattack where a server, system, or network is overloaded with traffic and rendered nonfunctional. A DDoS attack is different from a regular DoS attack in that it is committed by multiple IP addresses or machines, rather than just one.
DKIM (DomainKeys Identified Mail)
DKIM is a standard email authentication protocol that helps ensure sender addresses aren’t forged and emails aren’t altered in transit. DKIM affixes a digital signature linked to a domain name, so recipients can verify that the sender address is authorized by said domain.
Read More
DMARC
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a standard email authentication protocol. It helps mail administrators and domain owners prevent email spoofing from cyberattackers. Servers can look up the DMARC policy of an incoming email to validate that its DKIM signature is valid, the headers align with the proper domain, and the address matches the domain.
Read More
DNS (Domain Name Server) Spoofing and Poisoning
A DNS spoof, also called DNS cache poisoning, is a cyberattack where criminals redirect traffic from a legit site to a malicious copycat. They alter DNS records by hijacking a DNS server, or intercepting communications between a server and user, and eventually returning an incorrect IP address. The malicious site may install viruses or prompt users to enter login credentials.
Read More
Email Archiving
Email archiving is the process of securely storing emails, making it easy to search for and retrieve them. It helps store old emails that you don’t need immediate access to, but don’t want to delete. Beyond the convenience of quickly finding emails and preserving server speeds, email archiving is vital for security and compliance purposes.
Read More
Email Filters
Email filtering is the act of processing emails—incoming and sometimes outgoing—to classify and categorize them. This is usually done by an SMTP server. Email filtering is often used to detect spam, viruses, and malware before it reaches a user.
Read More
Email Protection
Email protection is a combination of software and processes designed to defend an organization’s inboxes from email-based cyberattacks. This ranges from email security software that scans and detects malicious content and intent in messages to security awareness training for end users.
Read More
Email Quarantine
Email Quarantine is a dedicated storage area that isolates harmful messages detected by security solutions from reaching your end-users inboxes.
Read More
Email Scams
Email scams are cyberattacks sent over email that use social engineering tactics to trick people into sharing private data or installing malicious software.
Read More
Email Security
Email security is a set of processes and technologies to protect email accounts, users, and organizations from unauthorized and malicious messages.
Read More
Email Spoofing
Email spoofing is a method to send emails with a forged sender address, often used to deliver spam and phishing attacks. A strong email security framework can detect and prevent it.
Read More
Encryption
Encryption is the process of disguising data so it’s impossible to decipher without authorization. Encryption often involves changing information from plaintext to ciphertext. It’s a vital practice for strong data privacy and security.
Read More
Firewall
A firewall is a type of network security that filters incoming and outgoing traffic. It acts as a barrier between a trusted, internal network and an unknown, external network–like the Internet.
GDPR (General Data Protection Regulation)
GDPR is a data privacy law in the European Union that regulates the collection and processing of personal data. Businesses that operate in the EU need a strong cybersecurity framework to comply with the GDPR to avoid substantial penalties.
Graymail
Graymail is a promotional email from a legitimate sender that varies in value to different users. Different from spam, the variance in content and in relevance to users makes it more challenging to filter with rules or policies. It may be a bulk email that a recipient has subscribed to in the past, like a newsletter, or a cold call from a vendor.
Read More
HIPAA Compliance
In cybersecurity and IT, HIPAA (Health Insurance Portability and Accountability Act) compliance is a set of stringent regulations regarding privacy and security of protected health information (PHI). Not adhering to HIPAA compliance can lead to substantial fines.
Impersonation Attacks
An impersonation attack is a type of cybercrime where a criminal poses as a known person or organization to steal confidential data or money. Attackers use social engineering tactics to assume an identity–either by compromising an account or creating a lookalike–and ask unsuspecting victims to complete routine tasks like paying an invoice, sharing a file, or clicking a link.
Read More
Indicators of Compromise (IOCs)
Indicators of Compromise (IOC) are forensic clues and evidence of a potential breach within an organization's network or system. IOCs give security teams essential context in discovering and remediating a cyberattack.
Read More
Insider Threat
An insider threat is a person within an organization who poses a cyber security risk. This person uses their credentials and trusted status to compromise a network or leak data to unauthorized people outside the organization, intentionally or accidentally.
Read More
Integrated Cloud Email Security (ICES)
Integrated cloud email security (ICES) is a cloud-based email security solution that supplements the native security capabilities of a cloud email provider like Microsoft or Google. ICES is a relatively new term coined by Gartner to describe the evolving offerings in the email security market.
Read More
IP Reputation
IP reputation measures the behavioral quality of an IP address and how many unwanted requests it sends. If an IP address sends authentic, spam-free emails, it gets a positive IP reputation score. On the other hand, if associated with bulk spam, malware, dangerous domains, or suspicious locations, an IP address will have a poor IP reputation.
Read More
Malware
Malware is a type of malicious software (hence the name) designed to disrupt a victim’s computer, server, or network. It’s a catch-all term for software like viruses, trojan horses, ransomware, spyware, worms, and more.
Man in the Middle Attacks
A man-in-the-middle (MITM) attack happens when a cybercriminal positions themselves between two parties to intercept and eavesdrop on private communications. They can then trick users into revealing sensitive data like passwords or banking credentials.
Read More
MFA Bypass
A multi-factor authentication (MFA) bypass is a broad term referring to an attack method where a cybercriminal navigates around MFA requirements to gain unauthorized access to an account.
Read More
MFA Fatigue Attacks
Multi-factor authentication (MFA) fatigue attack is a social engineering tactic where attackers send numerous calls or push notifications to a person's authenticator app or phone, hoping the person will eventually accept one. The attackers then gain access to the account. In some cases, the attacker may pose as a trusted figure like a coworker in IT.
Read More
MX Record
An MX record, or mail exchange record, is a DNS record that routes emails to specified mail servers. MX records essentially point to the IP addresses of a mail server’s domain. MX records can specify and prioritize multiple email servers, which is necessary for load balancing and avoiding outages. And they're an important part of troubleshooting mail delivery problems for any organization.
Read More
Packet Loss
Packet loss is a data transmission error when pieces of data (packets, in this case) don’t make it to their intended destination. Packet loss is usually caused by network congestion, software bugs, cyberattacks, or hardware issues.
Proxy Server
A proxy server acts as an intermediary or gateway between a user and the Internet. It’s the middleman between an end user and a network resource and it can provide an added layer of security.
QR Code Phishing Attacks
QR phishing, or quishing, is a type of phishing attack where an attacker tries to trick a victim into interacting with a QR code image. The QR code usually redirects users to a page where they are prompted to enter login credentials. Unfortunately, these pages are malicious copies, and attempting to log in gives attackers access to credentials, compromising the user’s account.
Read More
Ransomware
Ransomware is a type of malware that can lock computers, networks, and systems until a ransom is paid. It's a growing problem for businesses and individuals alike.
Read More
Sandbox
A sandbox is a computer security term for an isolated environment where any suspicious or unknown code can run without putting the host device or network at risk. Sandboxes are vital in cybersecurity to vet and analyze potential threats.
Secure Email Gateway (SEG)
A Secure Email Gateway (SEG) is a hardware appliance or piece of software that monitors emails sent and received. SEGs are designed to keep threats like spam, malware, phishing attacks, and unwanted messages out of user inboxes.
Read More
Security Awareness Training
Security awareness training minimizes security risks by empowering employees with tools and knowledge against cyber threats. It's a necessary part of cybersecurity–organizations are only as safe as their users.
Read More
Sender Policy Framework (SPF)
Sender Policy Framework (SPF) is an email authentication protocol that helps verify an email’s true sender. Receiving servers use SPF to check that an email comes from a server approved by the purported sending domain.
Read More
SMTP (Simple Mail Transfer Protocol)
SMTP is a common language used to send email. It’s a universal set of rules that allow servers and email clients to communicate via the internet. It helps increase email deliverability and reduce spam by verifying email senders. Think of SMTP as the language your computer uses to tell a server where an email goes, what’s in the email, what’s attached, and more.
Read More
Social Engineering
In information security, social engineering refers to deceptive and manipulative practices used by bad actors to trick people into sharing sensitive data or sending money to a threat actor. Social engineering is a cornerstone of many successful cyberattacks, and it's unique from other attacks in that it doesn't require technical skills.
Read More
Spam
Spam is unsolicited junk email sent in bulk. Most spam messages are sent with commercial interests in mind, but some more nefarious spam messages can include malware or phishing attempts.
Spear Phishing
Spear Phishing is a highly targeted cyberattack where criminals research a victim to send convincing phishing emails. It's effective and potentially devastating.
Read More
Supply Chain Attack
Supply chain attacks are sophisticated cyberattacks that bypass traditional security measures. A criminal compromises a trusted vendor, opening the door for attacks across a supply chain. They can infect shared infrastructure with malware, or send convincing phishing attacks from the trusted vendor.
Read More
Trojan Horse
A trojan horse is a catch-all term for malware that is disguised to look unsuspicious. Trojans usually spread via social engineering to give attackers unauthorized access to computers and networks.
VPN
A VPN—or virtual private network—allows you to maintain online anonymity while using the Internet. VPN’s often hide IP addresses and encrypt user data, making them useful for privacy enthusiasts or people who use public Wi-Fi.
WannaCry
WannaCry was a massive ransomware attack in 2017 that impacted over 200,000 computers across 150 countries, causing billions of dollars in damages. Several sources identified North Korea as the origin of the attack.
Watering Hole Attack
A watering hole attack is a threat vector that targets a specific group of users by compromising a website they frequently visit. The watering hole refers to predators who wait for prey by the watering hole—in this case, a compromised website.
Whaling
Whaling is a type of spear phishing attack that specifically targets or impersonates high-value targets—like C-suite executives–to steal sensitive data and, ultimately, money. Whaling attacks are a form of social engineering that utilize false urgency and deep research to trick victims.
Read More
Zero Trust Security
Zero trust is a cybersecurity framework based on the principle that nothing is automatically trusted. Every person, device, or digital interaction is immediately regarded as a potential threat by the framework until they're properly authenticated. The zero trust strategy is a collection of procedures designed to protect a network from internal threats.
Read More
Get the Latest Insights
Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.
Get AI Protection for Your Human Interactions
Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
See a Demo