zerofox logo

Glossary

ABCDEFGHIJKLMNOPQRSTUVWXYZ
A

Access Control

What is Access Control? Access control is a collection of cybersecurity techniques that regulate who can enter, view,...

Access Control

Account Takeover

What is Account Takeover? An account takeover is a type of cyberattack where attackers attempt to gain unauthorized...

Account Takeover

Artificial Intelligence Security Tools

What is Artificial Intelligence? Artificial intelligence is an area of computer science that uses technologies like machine learning...

Artificial Intelligence Security Tools

Attack Surface

What is an Attack Surface? An enterprise organization’s attack surface includes all of its network infrastructure, applications, endpoints,...

Attack Surface

Attack Surface Intelligence

What Is Attack Surface Intelligence? Attack Surface Intelligence is the continuous process of discovering, monitoring, and understanding every...

Attack Surface Intelligence
B

Botnet

What is a Botnet? A botnet is a network of Internet-connected devices (e.g. computers, mobile devices, etc.), hijacked...

Botnet

Brand Intelligence

What is Brand Intelligence? Brand Intelligence is a type of cyber threat intelligence that deals with the identification...

Brand Intelligence

Brand Monitoring

Brand Monitoring

Business Email Compromise

What is Business Email Compromise? Business Email Compromise (BEC) is a scam where a cybercriminal uses a falsified...

Business Email Compromise
C

Cyber Threat Intelligence

What is Cyber Threat Intelligence? Cyber Threat Intelligence (CTI) is the process of collecting and analyzing data to...

Cyber Threat Intelligence

Cyberattack Surface Management

What is the Cyberattack Surface? An organization’s cyberattack surface is the collection of all its digital assets that...

Cyberattack Surface Management

Cybersecurity

What is Cybersecurity? Cybersecurity is the combination of people, policies, processes and technologies employed by an enterprise to...

Cybersecurity

Cybersecurity Attack

What is a Cybersecurity Attack? A cybersecurity attack is an effort by a malicious threat actor to gain...

Cybersecurity Attack

Cybersecurity Awareness

What is Cybersecurity Awareness? Even with the most robust threat monitoring, intelligence, and disruption capabilities, organizations and their...

Cybersecurity Awareness

Cybersecurity Risk Management

What is Cybersecurity Risk Management? Risk management is the process of identifying potential risks to an organization, assessing...

Cybersecurity Risk Management

Cybersecurity Threat Intelligence

What is Cybersecurity Threat Intelligence? Cybersecurity threat intelligence is the strategic process of collecting and analyzing data from...

Cybersecurity Threat Intelligence
D

Dark Web Threat Intelligence

What is Dark Web Threat Intelligence? Dark Web Threat Intelligence leverages data collection from the deep and dark...

Dark Web Threat Intelligence

Data Breach

What is a data breach? A data breach is a security incident in which a threat actor gains...

Data Breach

Deep and Dark Web

Deep and Dark Web

Deepfake Detection

Part 1: Understanding Deepfake Detection What is Deepfake Detection? Deepfake detection refers to the technologies, methods, and processes...

Deepfake Detection

Definitive Guide to Brand Protection

What is Brand Protection? Across every industry, organizations rely on digital channels to drive brand awareness, promote their...

Definitive Guide to Brand Protection

Digital Risk Management

What is Digital Risk Management? Digital risk management is the process of understanding and mitigating risks that emerge...

Digital Risk Management

Digital Risk Protection (DRP)

What is Digital Risk Protection? Digital Risk Protection (DRP) is cybersecurity protection for an organization’s vulnerable digital assets...

Digital Risk Protection (DRP)

Domain Monitoring

What is Domain Monitoring? Digital threat actors are increasingly targeting public and private sector organizations, along with their...

Domain Monitoring

Domain Protection

What is Domain Protection? Organizations of all sizes use websites to drive brand engagement, share information and resources,...

Domain Protection

Domain Spoofing

What is Domain Spoofing? Domain spoofing is a tactic used by cyber threat actors to fool their victims...

Domain Spoofing

Doxxing

What is Doxxing? Doxxing is the act of compiling and publicly releasing Personal Identifying Information (PII) about an...

Doxxing
E

Email Security

What Is Email Security? With over 4 billion active email users and 300 billion messages exchanged each day,...

Email Security

Email Spoofing

Email Spoofing Definition Email spoofing is a technique used by cyber scammers to fraudulently manipulate the sender address...

Email Spoofing

Encryption

What is Encryption? Encryption is the practice of using mathematical models and algorithms to encode digital information such...

Encryption

Executive Protection

What is Executive Protection? Executive protection refers to the cybersecurity monitoring, threat intelligence, and threat remediation capabilities used...

Executive Protection

External Cybersecurity

What is External Cybersecurity? External cybersecurity is the deployment of human threat experts and machine intelligence to identify...

External Cybersecurity

External Threat Intelligence Services

What are External Threat Intelligence Services? An external threat intelligence service is a subscription-based service where a third-party...

External Threat Intelligence Services
F

Firewall

What is a Firewall? A firewall is a hardware, software, or cloud-based security tool (or device) that functions...

Firewall

Fraud Detection

What is fraud detection? Fraud detection is the proactive process of identifying attempts to defraud your organization, executives,...

Fraud Detection

Fraud Intelligence

What is Fraud Intelligence? Fraud Intelligence is a type of threat intelligence concerned with identifying fraud specialists and...

Fraud Intelligence
G

Geopolitical Intelligence

What is Geopolitical Intelligence? Geopolitical intelligence is curated information that helps enterprises understand and manage location-based threats to...

Geopolitical Intelligence

Geopolitical Intelligence Platform

What is a Geopolitical Intelligence Platform? A geopolitical intelligence platform is a software solution that provides enterprise organizations...

Geopolitical Intelligence Platform
I

Impersonation

What is Impersonation in Cybersecurity? Impersonation is one of the most commonly used social engineering techniques used by...

Impersonation

Incident Response

What is an Incident Response? A robust incident response program helps businesses identify, prioritize, contain, and eradicate cyberattacks....

Incident Response

Information Leakage

What is Information Leakage? As security teams work to protect their organization’s digital assets and infrastructure from cyberattacks,...

Information Leakage
K

Keylogger

What is a Keylogger? A keylogger is a software program that tracks and records every keystroke a person...

Keylogger
M

Malware

What is Malware? Malware is any software program used by digital threat actors to damage, infect, or otherwise...

Malware

Malware Intelligence

What is Malware Intelligence? Malware intelligence is a type of threat intelligence that focuses on identifying, detecting, and...

Malware Intelligence

Multi-factor Authentication (MFA)

What is Multi-factor Authentication (MFA)? Multi-factor authentication is a secure digital login process where users are required to...

Multi-factor Authentication (MFA)
O

Open Source Intelligence

What is Open Source Intelligence? Open source intelligence (OSINT) is threat intelligence produced by collecting and analyzing data...

Open Source Intelligence
P

Password Hashing

What is Password Hashing? Digital access control systems must maintain records of user credentials (e.g. usernames and passwords)...

Password Hashing

Phishing Attack

What is a Phishing Attack?  Phishing attacks are malicious in nature, with the intent of luring victims into...

Phishing Attack

Phishing Campaign

What is a Phishing Campaign? A phishing campaign is a scam created by cybercriminals to steal financial resources...

Phishing Campaign

Phishing Email

Phishing Email Definition Phishing is a type of social engineering attack that uses fraudulent communications to trick the...

Phishing Email

Physical Security Intelligence

What Is Physical Security Intelligence? Physical Security Intelligence (PSI) is the continuous monitoring and analysis of real-world threats...

Physical Security Intelligence

Protective Intelligence

What is Protective Intelligence? Protective Intelligence is the proactive identification, assessment, and mitigation of potential threats to high-profile...

Protective Intelligence
R

Ransomware

What is Ransomware? Ransomware is a type of malicious software (malware) used by digital adversaries to commit criminal...

Ransomware
S

Security Operations Center (SOC)

What Is a Security Operations Center? A Security Operations Center (SOC) is a team of IT security professionals...

Security Operations Center (SOC)

SEO Poisoning

What Is SEO Poisoning? SEO poisoning is a cyberattack technique where threat actors manipulate search engine rankings to...

SEO Poisoning

Shadow AI

Shadow AI cybersecurity refers to the risks created when employees or third parties use unapproved AI tools without...

Shadow AI

Smishing

What is Smishing? Smishing is a form of cyber attack that involves sending fraudulent text messages to manipulate...

Smishing

Social Engineering

What is Social Engineering? Social engineering – the art of hacking human beings – is an age-old threat....

Social Engineering

Social Engineering Attack

What is Social Engineering? Some cybercriminals are experts at discovering and exploiting technical vulnerabilities in applications and networks,...

Social Engineering Attack

Social Media Monitoring

What is Social Media Monitoring? As organizations expand their presence on social media, digital adversaries are increasingly leveraging...

Social Media Monitoring

Social Media Risk

What is Social Media?  Many people mistakenly ‘define’ social media as Facebook, Twitter, Instagram and LinkedIn, but social...

Social Media Risk

Spear Phishing Attack

What is a Spear Phishing Attack? A spear-phishing attack is a form of email scam that targets a...

Spear Phishing Attack

Spoof Email Address

What is a Spoof Email Address? A spoof email address is a “fake” email address that resembles the...

Spoof Email Address

Supply Chain Intelligence

What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence that focuses on identifying,...

Supply Chain Intelligence
T

The Definitive Guide to Breach Intelligence

What is Breach Intelligence? Breach intelligence is a type of threat intelligence that helps enterprises detect, investigate, and...

The Definitive Guide to Breach Intelligence

Third Party Intelligence

What is Third Party Intelligence? Third party intelligence is a threat intelligence service that provides you with alerts...

Third Party Intelligence

Third Party Risk Intelligence

What is Third Party Risk Intelligence? Third party risk intelligence is a threat intelligence service that provides you...

Third Party Risk Intelligence

Threat Intelligence

What is Threat Intelligence? Threat intelligence, also called Cyber Threat Intelligence (CTI) is actionable knowledge about cyber threats:...

Threat Intelligence

Threat Intelligence Feeds Defined

What are Threat Intelligence Feeds? Threat intelligence feeds are data streams containing the latest information, research, and reports...

Threat Intelligence Feeds Defined

Threat Intelligence Platform

Threat Intelligence Platform

Threat Intelligence Software

What is Threat Intelligence Software? Threat intelligence software is a software application that provides enterprise cybersecurity teams with...

Threat Intelligence Software

Threat Intelligence Tools

What are Threat Intelligence Tools? Threat intelligence tools are the modeling frameworks, intelligence feeds, databases, utilities, and software...

Threat Intelligence Tools

Two-Factor Authentication (2FA)

What is Two-Factor Authentication? Two-factor authentication (2FA), a type of multi-factor authentication (MFA) is an Identity and Access...

Two-Factor Authentication (2FA)
V

VIP Protection

What Is VIP Protection? VIP Protection is the coordinated use of digital and physical security intelligence to safeguard...

VIP Protection

Vulnerability Intelligence

What is Vulnerability Intelligence? Vulnerability intelligence is a type of threat intelligence that focuses on identifying and reporting...

Vulnerability Intelligence

Vulnerability Management

What is Vulnerability Management? Digital adversaries can exploit both unknown and known security vulnerabilities in IT infrastructure to...

Vulnerability Management

Vulnerability Management Programs

What is a Vulnerability Management Program? Digital adversaries can bypass enterprise cybersecurity defenses and gain unauthorized access to...

Vulnerability Management Programs
W

Whaling

What is Whaling? Whaling is a type of highly-targeted phishing attack where the intended target is a high-profile,...

Whaling
Z

Zero Day

What is a Zero-Day Vulnerability? A zero-day vulnerability is a software vulnerability that is discovered by hackers or...

Zero Day

Zero Trust

What is Zero Trust? Zero Trust is an approach to enterprise cybersecurity that emphasizes data and service protection...

Zero Trust