Glossary

Pig Butchering Scam
A long-term fraud scheme combining romance or relationship scams with fake investment opportunities, where attackers cultivate trust with victims over weeks or months before convincing them to invest in fraudulent cryptocurrency or trading platforms.
Read More
MFA Fatigue
A social engineering attack that bombards users with repeated multi-factor authentication push notifications until they approve one out of frustration, confusion, or to stop the notifications—granting attackers access to protected accounts.
Read More
Infostealer
A category of malware specifically designed to harvest sensitive information from infected devices, including saved passwords, browser cookies, session tokens, cryptocurrency wallets, and other credentials that enable account takeover and fraud.
Read More
Formjacking
A cyber attack where malicious code is injected into e-commerce website payment forms to secretly capture and steal customer payment card data as it's entered during checkout.
Read More
Fake Shop
Fraudulent e-commerce websites designed to steal payment information, take money without delivering products, or ship counterfeit goods while impersonating legitimate retailers or creating convincing standalone storefronts.
Read More
Combosquatting
A domain squatting technique where attackers register domains that combine a legitimate brand name with additional words, creating deceptive URLs that appear related to the target organization.
Read More
Callback Phishing
A phishing technique where attackers send emails or messages containing phone numbers instead of malicious links, directing victims to call and speak with scammers who then manipulate them into installing malware, providing credentials, or making payments.
Read More
Brand Monitoring
The continuous process of tracking and analyzing how a brand is represented, mentioned, or misused across digital channels including websites, social media, app stores, marketplaces, and the dark web.
Read More
Authorized Push Payment (APP) Fraud
A type of financial fraud where victims are manipulated through social engineering into voluntarily authorizing payments to accounts controlled by criminals, making recovery difficult because the victim initiated the transaction.
Read More
Phishing Infrastructure
The complete technical ecosystem attackers use to conduct phishing campaigns, including domains, hosting servers, email systems, redirect chains, credential capture mechanisms, and supporting services.
Read More
Domain Reputation
A scoring system used by security tools, email providers, and browsers to assess the trustworthiness of a domain based on its history, behavior patterns, age, and associations with malicious activity
Read More
Malvertising
The use of online advertising platforms to distribute malware, steal credentials, or impersonate brands by purchasing search ads, display ads, or sponsored content that directs users to malicious destinations.
Read More
Takedown
The process of removing malicious online content, disabling fraudulent infrastructure, or terminating unauthorized accounts to stop active attacks and prevent victim harm.
Read More
Threat Actor
An individual or group that carries out malicious cyber activities, including nation-states, criminal organizations, hacktivists, insiders, or individual hackers.
Read More
Threat Intelligence
Information about current or emerging threats, threat actors, attack techniques, and indicators of compromise that enables organizations to understand risks and inform security decisions.
Read More
Typosquatting
Registering domain names that are common misspellings of legitimate brand domains to capture traffic from users who make typing errors and exploit this for fraud, advertising revenue, or other malicious purposes.
Read More
Vendor Email Compromise (VEC)
A form of business email compromise where attackers compromise legitimate vendor or supplier email accounts to send fraudulent invoices, redirect payments, or steal information from the vendor's customers.
Read More
Vishing
Voice phishing attacks conducted via phone calls where attackers impersonate legitimate organizations or individuals to manipulate victims into revealing sensitive information or performing harmful actions.
Read More
Whaling
Highly targeted phishing attacks directed at senior executives, board members, or other high-value individuals with significant authority, access, or information within organizations.
Read More
Zero Trust
A security model based on the principle of maintaining strict access controls and not trusting anyone by default, whether inside or outside the network perimeter, requiring continuous verification.
Read More
SPF (Sender Policy Framework)
An email authentication standard that allows domain owners to specify which mail servers are authorized to send email on behalf of their domain, helping prevent email spoofing.
Read More
Spear Phishing
Highly targeted phishing attacks directed at specific individuals or organizations, using personalized information and context to increase credibility and success rates compared to mass phishing campaigns.
Read More
Social Media Impersonation
The creation of fake profiles, pages, or accounts on social media platforms that falsely represent individuals, brands, or organizations to deceive followers and enable fraud or reputational harm.
Read More
Social Engineering
Psychological manipulation techniques used to deceive people into divulging confidential information, granting access, or performing actions that compromise security
Read More
Smishing
Phishing attacks conducted through SMS text messages that trick recipients into clicking malicious links, calling fraudulent numbers, or revealing sensitive information via text response.
Read More
Session Token Theft
The unauthorized capture of session cookies or tokens that maintain authenticated sessions, allowing attackers to hijack active user sessions without needing passwords or bypassing multi-factor authentication.
Read More
SEO Poisoning
A cyberattack technique where threat actors manipulate search engine rankings to position malicious websites prominently in search results, luring victims who trust organic search listings.
Read More
Ransomware
Malicious software that encrypts files or locks systems and demands payment (typically cryptocurrency) from victims in exchange for decryption keys or restored access.
Read More
Quishing
A phishing attack technique that uses malicious QR codes to redirect victims to phishing sites, credential harvesting pages, or malware downloads, exploiting the trust and convenience of QR code scanning.
Read More
Phishing-as-a-Service (PhaaS)
A cybercrime business model where criminals offer complete phishing campaign services to other attackers, providing infrastructure, templates, sending capabilities, and sometimes victim targeting on a subscription or revenue-share basis.
Read More
Phishing Kit
Pre-packaged software tools containing templates, scripts, and resources that enable cybercriminals to quickly deploy phishing campaigns without extensive technical knowledge.
Read More
Phishing
Fraudulent attempts to obtain sensitive information or manipulate victims into harmful actions by impersonating trustworthy entities through email, websites, messages, or other communication channels.
Read More
Open Source Intelligence (OSINT)
Intelligence gathering from publicly available sources including websites, social media, public records, news media, and other accessible information to understand threats, targets, or situations.
Read More
Multi-Factor Authentication (MFA)
A security mechanism requiring users to provide two or more verification factors to gain access to accounts or systems, substantially reducing risk from compromised passwords.
Read More
Mean Time to Takedown (MTTD)
A key performance metric measuring the average elapsed time between when a malicious asset (phishing site, fake social profile, fraudulent domain) is detected and when it is successfully removed from the internet.
Read More
Malware
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems, including viruses, trojans, ransomware, spyware, and other harmful programs.
Read More
Lookalike Domains
Domain names intentionally registered to closely resemble legitimate brand domains through minor spelling variations, additional words, or different top-level domains to deceive users and enable impersonation attacks.
Read More
Keylogger
Malicious software or hardware that secretly records keystrokes on a computer or mobile device to capture passwords, credit card numbers, messages, and other sensitive information typed by users.
Read More
Impersonation-as-a-Service
Underground cybercrime services where attackers offer to create and operate impersonation campaigns targeting specific brands, executives, or organizations on behalf of paying clients.
Read More
Homograph Attack
A method of deceiving users by registering domain names that use characters from different alphabets or scripts that appear visually identical to legitimate domain names, enabling effective spoofing and phishing.
Read More
Fake Website
Fraudulent websites designed to impersonate legitimate businesses, services, or brands to deceive visitors for purposes of theft, fraud, malware distribution, or data collection.
Read More
Executive Protection
Comprehensive security measures designed to protect senior executives and high-profile individuals from physical threats, cyber attacks, privacy violations, and reputational harm.
Read More
Email Spoofing
The creation of email messages with a forged sender address to make the email appear as though it originates from someone or somewhere other than the actual source.
Read More
Domain Spoofing
The practice of creating emails, websites, or other digital assets that fraudulently appear to originate from a legitimate domain to deceive recipients and bypass security controls.
Read More
DKIM (DomainKeys Identified Mail)
An email authentication method that allows receiving mail servers to verify that email claiming to come from a specific domain was actually authorized by that domain's owner and wasn't altered in transit.
Read More
Disinformation Security
An emerging cybersecurity category focused on protecting organizations from synthetic media, brand impersonation, deepfakes, and coordinated deception campaigns that exploit trust rather than technical vulnerabilities.
Read More
Digital Risk Protection (DRP)
A comprehensive cybersecurity approach focused on identifying, monitoring, and mitigating threats that originate outside traditional network perimeters across digital channels and the extended attack surface.
Read More
Dark Web
A portion of the internet that requires specific software, configurations, or authorization to access, where users and website operators maintain anonymity and activities remain largely untraceable.
Read More
Decoy Credentials
Fake but realistic-looking usernames, passwords, and other authentication data intentionally planted on phishing sites to pollute attacker databases, waste criminal resources, and generate threat intelligence.
Read More
Data Breach
A security incident in which sensitive, protected, or confidential information is accessed, stolen, or disclosed by unauthorized individuals, whether through cyber attack, insider threat, or accidental exposure.
Read More
Cybersquatting
The practice of registering, trafficking, or using domain names with bad faith intent to profit from trademarks or brand names owned by others.
Read More
Credential Harvesting
The process by which attackers collect usernames, passwords, and other authentication information through phishing sites, malware, or social engineering techniques.
Read More
CEO Fraud
A specific type of Business Email Compromise where attackers impersonate a company's CEO or senior executive to manipulate employees into making unauthorized wire transfers or divulging confidential information.
Read More
Blocklisting
The process of adding malicious URLs, domains, or IP addresses to security databases that warn or prevent users from accessing known threats across browsers, networks, and security tools.
Read More
Business Email Compromise (BEC)
A sophisticated phishing attack where criminals impersonate executives, vendors, or business partners to manipulate employees into transferring money or sensitive information.
Read More
Brand Impersonation
The unauthorized use of a company's name, logo, visual identity, or reputation to deceive customers, partners, or employees for malicious purposes.
Read More
Attack Surface
The sum total of all possible entry points where unauthorized users could attempt to access or extract data from an organization's digital environment.
Read More
Adversary-in-the-Middle (AitM)
An advanced phishing technique where attackers intercept communications between a user and legitimate service, capturing credentials and session tokens even when multi-factor authentication is enabled.
Read More
Executive Impersonation
A targeted attack where criminals impersonate senior executives or high- ranking officials to manipulate employees, partners, or systems into unauthorized actions or information disclosure.
Read More
Deepfake
Synthetic media created using artificial intelligence to manipulate or generate convincing but fake visual and audio content, including videos and voice recordings of real people.
Read More
Credential Stuffing
An automated attack technique where criminals test large volumes of stolen username and password combinations across multiple services to find accounts where users reused credentials.
Read More
Account Takeover (ATO)
A cyber attack where unauthorized individuals gain access to legitimate user accounts through stolen credentials, phishing, or social engineering techniques.
Read More

See the threats targeting your brand right now

Get a customized assessment showing active impersonation, phishing infrastructure, and exposed credentials specific to your organization. No commitment required.