FAQ List

Ransomware Terminology

What is Air Gapping?

Read

What is AdFind?

Read

What is a Ransomware Affiliate?

Read

What is an Advanced Persistent Threat (APT)?

Read

What is the Advanced Encryption Standard (AES)?

Read

What is an Attack Surface?

Read

What is Backup Destruction?

Read

What is Asymmetric Encryption?

Read

What is Big-Game Hunting?

Read

What is Bitcoin?

Read

What is Anti-Ransomware?

Read

What is Adware?

Read

What is Artificial Intelligence (AI) In Security?

Read

What is Antivirus (AV)?

Read

What is Covenant?

Read

What is a Brute Force Attack?

Read

What is Cobalt Strike?

Read

What is Brute Ratel?

Read

What is a Bootkit?

Read

What is BloodHound?

Read

What is Code Signing Abuse?

Read

What is a CVE?

Read

What is a Buffer Overflow?

Read

What is Command And Control (C2)?

Read

What is an Attack Vector?

Read

What is Botnet?

Read

What is Credential Dumping?

Read

What is a Data Breach?

Read

What is Data Encryption?

Read

What is Data Exfiltration?

Read

What is Cyber Insurance?

Read

What is Cross-Site Scripting (XSS)?

Read

What is CryptoLocker?

Read

What is Credential Harvesting?

Read

What is the Cyber Kill Chain?

Read

What is Crypto Ransomware?

Read

What is Cryptocurrency?

Read

What is Credential Stuffing?

Read

What is Decryption?

Read

What is Data Loss Prevention (DLP)?

Read

What is Defense Evasion?

Read

What is a Data Leak Site?

Read

What is a Distributed Denial Of Service Attack?

Read

What is DCShadow?

Read

What is DCSync?

Read

What is Dwell Time In Cybersecurity?

Read

What is DLL Sideloading?

Read

What is Double Extortion?

Read

What is a Dropper?

Read

What is a Drive-By Download?

Read

What is DLL Injection?

Read

What is DNS Tunneling?

Read

What is a Domain Generation Algorithm (DGA)?

Read

What is an Exploit In Cybersecurity?

Read

What is EternalBlue?

Read

What is Endpoint Detection And Response (EDR)?

Read

What is an Exploit Kit?

Read

What is Endpoint Protection (EPP)?

Read

What is Encryption Key?

Read

What is Emotet?

Read

What is Empire?

Read

What is Fileless Malware?

Read

What is Extended Detection And Response (XDR)?

Read

What is Encryption?

Read

What is Endpoint Detection And Response (EDR)?

Read

What is a Golden Ticket Attack?

Read

What is Initial Access?

Read

What is an Insider Threat?

Read

What is an Initial Access Broker (IAB)?

Read

What is Exploitation In The Context Of Cybersecurity?

Read

What is a Honeypot?

Read

What is Immutability?

Read

What is IcedID?

Read

What is an Immutable Backup?

Read

What is Incident Response?

Read

What is an Indicator Of Compromise?

Read

What are LOLBins?

Read

What is a Loader?

Read

What is Machine Learning?

Read

What is Locker Ransomware?

Read

What is LSASS?

Read

What is a Keylogger?

Read

What is a Logic Bomb?

Read

What are Intrusion Detection And Prevention Systems (IDS/IPS)?

Read

What is Lateral Movement?

Read

What is 'Living Off The Land'?

Read

What is Kerberoasting?

Read

What is LockerGoga?

Read

What is Malspam?

Read

What is MITRE ATT&CK?

Read

What is Managed Detection And Response (MDR)?

Read

What is Managed Security Service Provider (MSSP)?

Read

What is a Man-In-The-Middle (MITM) Attack?

Read

What is Malware?

Read

What is a Malicious Macro?

Read

What is Managed Detection And Response (MDR)?

Read

What is Mimikatz?

Read

What is Metasploit?

Read

What is Multi-Factor Authentication (MFA)?

Read

What is Pass-The-Ticket?

Read