- A
- Adware
Adware is software that delivers unwanted advertisements, often bundled with spyware to track user behavior.
Know more - APT
An Advanced Persistent Threat (APT) is a prolonged cyberattack in which attackers infiltrate a network and remain undetected while stealing
Know more - ARP Spoofing
ARP spoofing is a local network attack where attackers send forged ARP messages to associate their MAC address with another
Know more
- B
- Baiting
Baiting is a social engineering tactic where attackers lure victims with enticing offers or infected media devices.
Know more - BIMI
Brand Indicators for Message Identification (BIMI) is a standard that allows organizations to display their official logo in email inboxes
Know more - Botnet
A botnet is a network of compromised devices remotely controlled by attackers to launch large-scale cyberattacks.
Know more - Browser Isolation
Browser isolation runs web content in a secure, isolated environment to protect systems from malicious code on websites.
Know more - Brute Force Attack
A brute force attack systematically attempts all possible passwords until the correct one is found.
Know more - Business Email Compromise
Business Email Compromise (BEC) is a scam where attackers impersonate executives, employees, or vendors using spoofed or hacked accounts to
Know more
- C
- Container Security
Container security involves protecting applications in containers by managing vulnerabilities, runtime, and permissions.
Know more
- D
- DANE
DNS-based Authentication of Named Entities (DANE) is a protocol that uses DNSSEC to bind TLS certificates to domain names, providing
Know more - Data Exfiltration
Data exfiltration is the unauthorized transfer of sensitive information from a computer or network to an external destination controlled by
Know more - DDoS
A Distributed Denial-of-Service (DDoS) attack floods a target with traffic to overwhelm systems and disrupt service availability.
Know more - DKIM
DomainKeys Identified Mail (DKIM) uses cryptographic signatures to allow the receiving mail server to verify that an email was sent
Know more - DMARC
Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that protects against email spoofing and phishing by
Know more - DMARC Alignment
A condition required for DMARC compliance where the domain in the visible “From” header aligns with the domains authenticated by
Know more - DMARC Analyzer
A DMARC analysis tool that helps organizations monitor, visualize, and interpret DMARC reports to understand authentication results and adjust policies.
Know more - DMARC Compliance
When an email passes authentication and alignment checks as defined by SPF, DKIM, and DMARC policies, making it a trusted
Know more - DMARC Policy
The policy defined in the DMARC record that instructs receiving servers whether to monitor, quarantine, or reject emails that fail
Know more - DMARC Record
A DMARC record is a DNS TXT entry that specifies the domain’s DMARC policy. It tells receiving mail servers how
Know more - DMARC Reporting
The reporting mechanism of DMARC that provides aggregate (RUA) and forensic (RUF) reports to help organizations track authentication results and
Know more - DMARC Tags
Tags are the parameters inside a DMARC record (such as v, p, rua, ruf, pct) that define the domain’s authentication
Know more - DNS
The Domain Name System (DNS) is the hierarchical system that translates human-readable domain names into IP addresses that computers use
Know more - DNS MX Record
A Mail Exchange (MX) record is a type of DNS record that specifies the mail servers responsible for receiving and
Know more - DNS Record
A DNS record is a piece of data in the DNS that provides information about a domain, such as its
Know more - DNS Spoofing
DNS spoofing, also known as cache poisoning, is an attack that inserts false DNS data into a resolver’s cache, redirecting
Know more - DNSSEC
Domain Name System Security Extensions (DNSSEC) adds cryptographic signatures to DNS data to ensure authenticity and integrity, preventing tampering such
Know more
- E
- Email Authentication
Email authentication refers to a set of techniques, including SPF, DKIM, and DMARC, used to verify that emails originate from
Know more - Email Spoofing
Email spoofing is a technique where attackers forge the sender address on emails to make them appear as though they
Know more
- H
- Honey Trap
A honey trap scam uses fake personas, often romantic, to build trust and manipulate victims into revealing data.
Know more
- I
- IAM
Identity and Access Management (IAM) encompasses policies and tools that manage user identities and control access to organizational resources.
Know more - Insider Threat
An insider threat is a risk posed by employees or contractors misusing their access, either maliciously or accidentally.
Know more - IP Spoofing
IP spoofing is the falsification of IP packet headers to impersonate another system, often used in denial-of-service attacks or to
Know more - IPS
An Intrusion Prevention System (IPS) is a network security tool that monitors traffic in real time to detect and block
Know more
- K
- Keylogger
A keylogger is software or hardware that records keystrokes to capture sensitive information such as passwords.
Know more
- M
- MaaS
Malware-as-a-Service (MaaS) is a business model where malware developers rent or sell their tools to other attackers.
Know more - Malware
Malware is any software intentionally designed to disrupt, damage, or gain unauthorized access to computer systems.
Know more - MITM Attack
A Man-in-the-Middle (MITM) attack occurs when an attacker secretly intercepts and alters communication between two parties without their knowledge.
Know more - MTA-STS
Mail Transfer Agent–Strict Transport Security (MTA-STS) is a protocol that enforces secure TLS encryption for SMTP connections between mail servers,
Know more
- P
- p=none
A DMARC policy mode where emails failing authentication are monitored but still delivered to the recipient’s inbox. Used mainly for
Know more - p=quarantine
A DMARC policy mode where unauthenticated emails are flagged as suspicious and typically sent to the spam/junk folder.
Know more - p=reject
A DMARC policy mode where emails failing authentication are outright rejected and not delivered to recipients.
Know more - PAM
Privileged Access Management (PAM) is the control and monitoring of accounts with elevated privileges to reduce risks of misuse or
Know more - PCT Tag
The percentage tag that defines what proportion of email messages should be subjected to the DMARC policy (useful for gradual
Know more - Penetration Testing
Penetration testing is an authorized simulated cyberattack to identify and fix vulnerabilities before attackers exploit them.
Know more - Phishing
Phishing is a cyberattack method where attackers impersonate trusted entities through fraudulent emails or websites to trick users into revealing
Know more - Phishing-as-a-Service
Phishing-as-a-Service (PhaaS) is an illegal model where criminals provide ready-made phishing kits and infrastructure to others, enabling large-scale phishing campaigns
Know more - Piggybacking
Piggybacking is a physical or digital security breach where an unauthorized person gains access by exploiting someone else’s legitimate credentials
Know more - Pretexting
Pretexting is a social engineering technique where attackers create a fabricated scenario to manipulate victims into divulging confidential information.
Know more
- R
- RaaS
Ransomware-as-a-Service (RaaS) is a criminal model where ransomware developers lease their tools to attackers for profit.
Know more - Ransomware
Ransomware is malware that encrypts a victim’s files and demands payment in exchange for decryption.
Know more - Rootkit
A rootkit is a type of malware that hides its presence and grants attackers unauthorized administrative control of a system.
Know more - RUA Tag
The “Aggregate Reports” tag that specifies the email address where DMARC XML aggregate reports should be sent.
Know more - RUF Tag
The “Forensic Reports” tag that specifies the email address where detailed failure reports are sent when individual messages fail DMARC.
Know more
- S
- Scareware
Scareware is malware that uses deceptive warnings to frighten users into installing malicious software or paying for fake services.
Know more - Security Service Edge (SSE)
Security Service Edge (SSE) is a cloud-based cybersecurity framework that delivers secure access to applications, data, and services, no matter
Know more - Shadow IT
Shadow IT refers to the use of unauthorized systems or applications within an organization, often creating security and compliance risks.
Know more - Shadow IT
Shadow IT refers to the use of unauthorized systems or applications within an organization, often creating security and compliance risks.
Know more - Shoulder Surfing
Shoulder surfing is the act of stealing confidential information by watching a person enter data in public.
Know more - Smishing
Smishing is phishing conducted via SMS messages, tricking recipients into revealing sensitive data or clicking malicious links.
Know more - SMTP
Simple Mail Transfer Protocol (SMTP) is the standard protocol used to send and relay emails across the Internet.
Know more - Social Engineering
Social engineering manipulates human behavior to bypass security systems, often using deception to trick people into sharing information.
Know more - Spam
Spam refers to unsolicited bulk emails, often commercial or malicious, that clutter inboxes and can contain threats.
Know more - Spear Phishing
Spear phishing is a highly targeted form of phishing where attackers personalize messages to a specific individual or organization to
Know more - SPF
Sender Policy Framework (SPF) is an email validation system that identifies which mail servers are authorized to send email for
Know more - Spyware
Spyware is malicious software that secretly monitors user activity and collects information without consent.
Know more
- T
- Tailgating Attack
A tailgating attack is a physical security breach where an unauthorized person gains entry to a restricted area by closely
Know more - TLS
Transport Layer Security (TLS) is a cryptographic protocol that encrypts data exchanged over a network, ensuring privacy and integrity for
Know more - TLS-RPT
SMTP TLS Reporting (TLS-RPT) is a feedback mechanism that provides domain owners with reports about email delivery issues related to
Know more - Trojan
A Trojan horse is malware disguised as legitimate software that tricks users into installing it, providing attackers access to the
Know more - Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA) is a security process that requires users to provide two different types of credentials to verify their
Know more - Typosquatting
Typosquatting is the practice of registering misspelled domains to trick users into visiting malicious websites.
Know more
- V
- V Tag
The version tag in a DMARC record, which must always be set to DMARC1 to indicate the protocol version.
Know more - Virus
A computer virus is a type of malware that attaches itself to programs or files and spreads when they are
Know more - Vishing
Vishing is phishing over voice calls, where attackers impersonate trusted entities to extract information.
Know more - VPN
A Virtual Private Network (VPN) creates an encrypted tunnel between a device and a server to protect data in transit
Know more
- W
- Watering Hole Attack
A watering hole attack compromises websites likely to be visited by a target group, infecting them with malware.
Know more - Whaling
Whaling is a type of phishing that specifically targets high-ranking executives or individuals with privileged access by impersonating trusted colleagues
Know more
- Z
- Zero Trust
Zero Trust is a security model that assumes no user or system is inherently trustworthy and requires continuous verification for
Know more - Zero-Day Vulnerability
A zero-day vulnerability is an unknown software flaw that attackers exploit before the vendor has issued a patch, leaving systems
Know more
