zerofox logo

Glossary

ABCDEFGHIJKLMNOPQRSTUVWXYZ
A
B
C
D

Dark Web Threat Intelligence

What is Dark Web Threat Intelligence? Dark Web Threat Intelligence leverages data collection from the deep and dark...

learn more

Data Breach

What is a data breach? A data breach is a security incident in which a threat actor gains...

learn more

Deep and Dark Web

learn more

Deepfake Detection

Part 1: Understanding Deepfake Detection What is Deepfake Detection? Deepfake detection refers to the technologies, methods, and processes...

learn more

Definitive Guide to Brand Protection

What is Brand Protection? Across every industry, organizations rely on digital channels to drive brand awareness, promote their...

learn more

Digital Risk Management

What is Digital Risk Management? Digital risk management is the process of understanding and mitigating risks that emerge...

learn more

Digital Risk Protection (DRP)

What is Digital Risk Protection? Digital Risk Protection (DRP) is cybersecurity protection for an organization’s vulnerable digital assets...

learn more

Domain Monitoring

What is Domain Monitoring? Digital threat actors are increasingly targeting public and private sector organizations, along with their...

learn more

Domain Protection

What is Domain Protection? Organizations of all sizes use websites to drive brand engagement, share information and resources,...

learn more

Domain Spoofing

What is Domain Spoofing? Domain spoofing is a tactic used by cyber threat actors to fool their victims...

learn more

Doxxing

What is Doxxing? Doxxing is the act of compiling and publicly releasing Personal Identifying Information (PII) about an...

learn more
E
F
G
I
K
M
O
P
R
S

Security Operations Center (SOC)

What Is a Security Operations Center? A Security Operations Center (SOC) is a team of IT security professionals...

learn more

SEO Poisoning

What Is SEO Poisoning? SEO poisoning is a cyberattack technique where threat actors manipulate search engine rankings to...

learn more

Shadow AI

Shadow AI cybersecurity refers to the risks created when employees or third parties use unapproved AI tools without...

learn more

Smishing

What is Smishing? Smishing is a form of cyber attack that involves sending fraudulent text messages to manipulate...

learn more

Social Engineering

What is Social Engineering? Social engineering – the art of hacking human beings – is an age-old threat....

learn more

Social Engineering Attack

What is Social Engineering? Some cybercriminals are experts at discovering and exploiting technical vulnerabilities in applications and networks,...

learn more

Social Media Monitoring

What is Social Media Monitoring? As organizations expand their presence on social media, digital adversaries are increasingly leveraging...

learn more

Social Media Risk

learn more

Spear Phishing Attack

What is a Spear Phishing Attack? A spear-phishing attack is a form of email scam that targets a...

learn more

Spoof Email Address

What is a Spoof Email Address? A spoof email address is a “fake” email address that resembles the...

learn more

Supply Chain Intelligence

What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence that focuses on identifying,...

learn more
T
V
W
Z