InfoSec Glossary
Last Updated: April 2023
- Admin Event
- Application Allow-Listing
- Beacon
- BlueKeep
- Brute-Force Attack
- What Is Cloud Security Monitoring? A Complete Guide
- Cobalt Strike
- Command and Control
- Cross-Site Scripting
- Data Loss Prevention (DLP)
- Defacement
- Denial of Service
- Digital Forensic and Incident Response (DFIR)
- Directory Traversal
- Domain Admin (DA)
- Domain Name System (DNS)
- EDR (Endpoint Detection & Response)
- Emotet Malware
- Endpoint Protection
- EternalBlue
- File Transfer Protocol (FTP)
- Fileless Malware
- Geoblocking
- GuardDuty
- Hashing
- Incident Detection Engineer
- Keylogger
- Lateral Movement
- Least Privilege
- Mail Exchange (MX) Record
- Malicious Macro
- Malware
- Metasploit
- Mimikatz
- NGAV (Next-Gen Antivirus)
- Null Session
- OSSEC
- Password Spraying
- Port Knocking
- Port Scanning
- PowerShell
- Privilege Escalation
- Promiscuous Mode
- Proxy
- PsExec
- Quarantine
- Ragnar Locker Ransomware
- Ransomware
- RDP (Remote Desktop Protocol)
- Reconnaissance
- Regsvr32 Malicious DLL
- Remote Access Tool (RAT)
- Reverse DNS (rDNS)
- Root Cause Analysis (RCA)
- Salting
- Scripts
- Secure Shell (SSH)
- Server Message Block (SMB)
- Spambot
- Spear Phishing
- Spoof Domain
- SQL Injection (SQLi)
- Stuxnet
- Sudo
- Syslog
- System Monitor (Sysmon)
- Threat Intelligence
- Threat List Country
- TTP (Tactics, Techniques, Procedures)
- WannaCry Ransomware
- What is Endpoint Security? Explained
- What Is SIEM and What Are the Benefits?
- Cyber Insurance Explained
- Worm