Cybersecurity Knowledge Hub

Basic Cybersecurity
Terms and Types

Click one of the letters below to automatically scroll down to terms beginning with that letter:

Definitions and Explanations

Cyber security is the discipline of protecting computer systems, networks, devices, and data from malicious attacks. It covers identifying threats, isolating them, countering them with no or minimal data loss, and working towards threat prevention.

Cybersecurity Terms with
a
Account Takeover
Read more →

Account takeover is a type of fraud in which a cybercriminal gains unauthorized access to a victim's online account.

Advanced Persistent Threat (APT)
Read more →

The term APT refers to an advanced persistent threat or an attack group. This, however, is not just a single attack, but a set of attacks over a period of time. The nature of these attacks is stretched, and they’re conducted in multiple phases due to the fact that the attackers use sophisticated tactics and means of hiding their activities.

Affiliate Fraud
Read more →

Read about how iGaming affiliate fraud operates, what malicious signs to watch out for, and how to prevent it with Group-IB Fraud Protection

Antidetect Browsers
Read more →

In this article, we discuss a tool called antidetect browser, which is designed to bypass browser fingerprinting. We’ll explore the techniques used by antidetect browsers, examine both their legitimate use cases and how cybercriminals exploit them for fraud as well as how organizations can fight against the illegal use of antidetect browsers.

API Security
Read more →

Explore what API security means for your business, emerging threats, and actionable strategies to protect digital assets from API-related cyberattacks.

Attack Surface Management
Read more →

Explore Attack Surface Management: definition, importance, and strategies. Protect your organization's assets with Group-IB ASM.

Authorized Push Payment (APP) Fraud
Read more →

Authorized Push Payment (APP) fraud has evolved into a global cybercrime epidemic, with individuals and businesses losing billions each year to convincing social engineering attacks. This article delves into how fraudsters manipulate victims into willingly transferring funds.

Cybersecurity Terms with
c
Card Shop
Read more →

In cybersecurity, a card shop is a type of underground market that sells specific types of data – dumps and bank card credentials (СС). Card credentials are data in text format that may include card number, card expiration date, cardholder name, address, and CVV. Dumps stand for the contents of the magnetic strip of bank cards. 

Cloud Data Security Program
Read more →

Implement a robust cloud data security program with Group-IB to identify hidden vulnerabilities and safeguard sensitive data from cyber threats in cloud environments.

Cloud Jacking
Read more →

Protect against cloud jacking: definition, main attack vectors, and defense solutions

Computer Emergency Response Team (CERT)
Read more →

In cybersecurity, CERT stands for computer emergency response team - a team of information security analysts tasked with cyber incident detection, response, prevention, and reporting.

Computer Incident Response Center (CIRC)
Read more →

The term CIRC stands for computer incident response center or capability.

Computer Incident Response Team (CIRT)
Read more →

Discover CIRT's role, differences from CERT, CIRC, SOC, and the value of third-party providers in incident response. Your go-to guide.

Computer Security Incident Response Center (CSIRC)
Read more →

CSIRC or the Computer Security Incident Response Center is a specialized department responsible for managing and reacting quickly and efficiently to information security incidents within an organization.

Credential Stuffing Attacks
Read more →

Shield your business from Credential Stuffing: Learn what it is, prevention, and how Group-IB can help safeguard your data.

Credit Card Fraud
Read more →

Learn about credit card fraud and ways to protect yourself.

Crypto Wallet Drainers
Read more →

Learn all about crypto wallet drainers - malicious tools that steal digital assets from unsuspecting users and how to protect your cryptocurrency.

Cybercrime
Read more →

Learn what cybercrime is, its impact on society, and how to protect your business. ✓ Explore proactive tips and solutions to keep your business safe.

Cybersecurity Terms with
d
Dark Web
Read more →

Demystifying the Dark Web: Types of cybercrimes, access, and safeguarding your business with Group-IB's protection.

Data Lake
Read more →

A data lake is a centralized repository that allows you to store all your structured and unstructured data at scale.

Data Leak
Read more →

Understand data leaks' risks and prevention. Explore types, impacts, and monitoring solutions with Group-IB.

Data Loss Prevention
Read more →

Learn how data loss prevention (DLP) works, why it’s essential, the various types of DLP security, and features to look for.

Data Poisoning
Read more →

Data poisoning is when attackers slip misleading or malicious samples into AI training data so models learn the wrong lessons. The fallout ranges from subtle bias to backdoored behavior triggered by specific cues.

Dedicated Leak Sites
Read more →

A Dedicated Leak Site (DLS) is a website where the illicitly retrieved data of companies, that refuse to pay the ransom, are published.

Deep Web
Read more →

The deep web, also called the invisible web, is a part of the internet that is not indexed and therefore cannot be accessed through traditional web browsers such as Google, Bing, or Yahoo.

Deepfakes
Read more →

Discover the inner workings of deepfakes, from face swaps to voice attacks, and learn how to spot deep fakes before they can cause any harm.

Digital Forensics
Read more →

Explore Digital Forensics: components, tools, and discover Group-IB's digital forensics services.

Digital Forensics and Incident Response
Read more →

Unlocking Digital Forensics and Incident Response: Its scope, importance, choosing providers, and DFIR expertise with Group-IB.

Distributed Denial of Service (DDoS) Attacks
Read more →

Learn more about the dangers of DDoS and discover existing options to defend your digital resources from being flooded by attackers

DNS Servers
Read more →

Learn what a DNS server is and how it works. Explore the best DNS servers, public DNS options, and a step-by-step guide to optimize your internet speed and security.

Cybersecurity Terms with
i
Identity and Access Management (IAM)
Read more →

Mastering Identity and access management: System, components, importance, and optimizing IAM with Group-IB for your organization.

Identity Providers (IdP)
Read more →

Discover integrating Identity Providers & XDR for robust cloud security. Simplify access, fortify authentication, and detect threats proactively!

Identity Security
Read more →

Secure your business with Group-IB's IAM solutions. From passwordless access to expert consulting, fortify defenses against cyber threats. Align identity security with your business goals effectively.

Impersonation Scams
Read more →

Impersonation scams exploit urgency and trust with spoofed brands, fake support agents, and even AI-cloned voices. This guide highlights the telltale signs (look-alike domains, payment detours, odd verification asks) and offers quick verification steps you can use in seconds.

Incident Response
Read more →

Incident response is a complex multi-step process of identifying, localizing, and eliminating cybersecurity incidents.

Indicators of Attack (IOAs)
Read more →

Indicators of Attack flag intent in motion like suspicious child processes, rogue admin tools, odd DNS beacons, and stealthy persistence. This guide breaks down IOAs vs. IOCs, shows real examples mapped to MITRE ATT&CK, and outlines fast detection steps.

Indicators of Compromise (IOCs)
Read more →

Decoding Indicators of Compromise: Types, prevention, IOCs vs. IOAs, risk assessment, and managing IOCs with Group-IB.

Insurance Impersonation Scams
Read more →

Learn how impersonation fraud threatens insurance companies and how to protect your customers.

Intrusion Detection and Prevention Systems (IDS/IPS)
Read more →

Intrusion detection and prevention systems (IDS/IPS) are security systems designed to detect and protect against unauthorized access to companies’ infrastructure.

IOCs
Read more →

Learn about Indicators of Compromise (IoCs) in cybersecurity. Discover how IoCs help detect malware, data breaches, and cyber threats to protect your organization.

IPsec (Internet Protocol Security)
Read more →

Discover how IPsec secures data at the network layer and how to deploy it effectively in your cybersecurity strategy.

IT vs. OT in Cybersecurity
Read more →

Explore the differences and similarities between IT vs. OT in cybersecurity. Learn about their convergence, and the resulting benefits and implications of it.

Cybersecurity Terms with
p
Brute Force Attack
Read more →

Learn the different types of brute force attacks, common tools, and how Group-IB protects against account takeover.

Pass the Hash
Read more →

Pass the hash is an attack method that allows cybercriminals to use a password hash instead of the password itself to access resources within the network.

Password Combolists
Read more →

Combolists are bulk sets of stolen logins from stealer logs, ULP files, and old leaks, fueling credential stuffing in 2025. Learn sources, risks, and how to fight back.

Password Spraying
Read more →

Unlocking Password Spraying Attacks: Learn the differences, impacts, detection, prevention, and Group-IB's protective solutions.

Passwordless Authentication
Read more →

Understand passwordless authentication: methods, benefits, and strategies to secure enterprise systems and prevent credential attacks.

Patch Management
Read more →

Unpatched software is an open door. Discover how to optimize your patch management process, eliminating vulnerabilities and safeguarding your business against cyber threats.

Penetration Testing
Read more →

A penetration test (or pentest) is an imitation of a cyberattack against a system in order to identify weaknesses that threat actors could use to their advantage.

Personally Identifiable Information (PII)
Read more →

Learn what qualifies as PII, why it matters to your organization, and get practical steps to secure sensitive data, reduce breach risk, and stay compliant.

Phishing
Read more →

Phishing is a form of social engineering that implies tricking victims into disclosing sensitive data, such as payment card credentials, logins and passwords for specific accounts, password phrases for crypto wallets, etc.

Point-to-Point Tunneling Protocol (PPTP)
Read more →

Explore the Point-to-Point Tunneling Protocol's legacy, examine its critical security vulnerabilities, and discover why organizations must migrate to modern VPN alternatives.

Port 3389
Read more →

Learn how port 3389 enables secure Remote Desktop Protocol (RDP) access. Discover its functions, security risks, and 8 best practices for maximizing protection.

Prompt Injection Attacks
Read more →

Prompt injection attacks in LLMs smuggle hidden instructions into prompts or content the model reads. The result can be policy bypass, data leakage, or unintended tool actions.

Proxy
Read more →

A proxy server is an intermediary computer that sits between a user’s device and the wider internet. When you send a web request, it first goes to the proxy; the proxy then forwards that request to the destination server, receives the response, and passes it back to you.

Purple Team
Read more →

Purple team is a term for a blend of a red team and blue team. In contrast to the red teaming approach, purple teaming implies the collaborative work of “attackers” and “defenders”.

Cybersecurity Terms with
s
SaaS Security Posture Management (SSPM)
Read more →

Continuously monitor and secure your SaaS apps with SSPM. Detect misconfigurations, reduce risk, and ensure compliance in real time.

Sandbox
Read more →

A sandbox in cybersecurity is an isolated environment for detecting and analyzing malicious payloads.

Sandbox Evasion
Read more →

Sandbox evasion techniques are being built by cybercriminals to bypass modern malware analysis tools. 

Scam
Read more →

A scam is a deceptive business aimed at stealing money or other valuable goods from unsuspecting victims.

SD-WAN
Read more →

Learn how SD-WAN intelligently routes traffic to boost performance and decide which deployment you need.

Secure Access Service Edge (SASE)
Read more →

Secure Access Service Edge (SASE) is a cloud-based network security architecture that converges wide-area networking with security functions into a single service, delivering secure connectivity for any user, anywhere, on any device.

Secure Software Development Lifecycle (SSDLC)
Read more →

Secure software development lifecycle (SSDLc) is a software development lifecycle (SDLc) concept with a focus on building a secure product.

Security Information and Event Management (SIEM)
Read more →

Security Information and Event Management (SIEM) is a crucial part of any security system, as it connects and unifies the data contained in existing systems.

Security Operations Center (SOC)
Read more →

Learn about setting up a Security Operations Center (SOC). Explore core functions, SIEM benefits, building a SOC, and enhancing it with Group-IB MXDR and TI.

Security Theater
Read more →

Security theater creates a false sense of safety without real protection. Learn how to spot ineffective security measures and focus on real cybersecurity solutions.

Session Hijacking Attack
Read more →

Learn how session hijacking works, its cybersecurity risks, and how to prevent it with strong session control measures.

Session-Based Fraud Detection and Prevention
Read more →

Guarding Against Session-Based Fraud: Learn about common types, detection, prevention, and Group-IB's solutions.

Shadow IT
Read more →

Learn about Shadow IT, its risks, and how to manage it effectively. Explore real-world examples and discover Group-IB's Attack Surface Management solution.

SIM Swap
Read more →

Unauthorized SIM swapping occurs when a fraudster manipulates the mobile service provider to hijack a victim’s phone number.

Smishing
Read more →

Learn how SMS-based phishing attacks work, common indicators, and strategies to defend against smishing. 

SMS Bombing
Read more →

Defend Against SMS Bombing: Learn about the risks, motives, and protection methods. Discover Group-IB's solutions. Stay secure!

Social Engineering
Read more →

The social engineering definition boils down to various psychology-based techniques used to persuade people to disclose certain information or perform a specific action for malicious purposes.

Spear Phishing
Read more →

Learn what spear phishing is, how it works, and strategies to protect your enterprise from these targeted attacks.

Group-IB: Fight
against cybercrime

Trusted by 550+ enterprise businesses