Cybersecurity Glossary

To implement effective cybersecurity solutions built for the digital world, it’s important to understand common industry concepts and definitions. This glossary provides you with cybersecurity terms to be aware of as you look to protect your organization against cyber threats.

What is barrel phishing?

Also referred to as “double-barreled” phishing, barrel phishing is a more sophisticated form of phishing that involves two emails. The first email—often referred to as the “bait email”—attempts to establish a relationship with the recipient or trick them into believing the sender is a trusted source. Once the recipient’s guard is lowered, they’re sent a follow-up email where the actual phishing occurs, usually in the form of malicious links.

Read more ›
What is a botnet?
Botnet, short for “robot network,” is a compromised network of connected devices. The infected devices are controlled remotely by a threat actor to carry out malicious activities, such as launching distributed denial-of-service (DDoS) attacks, sending spam and phishing campaigns, carrying out brute force attacks, and more. Botnet attacks continue to rise with the growth of unsecured IoT devices, creating vulnerabilities for cybercriminals. Emotet, the infamous malware, is an example of a botnet.
What is brand impersonation?

Brand impersonation is a type of email phishing attack where cybercriminals pose as a trusted brand to dupe victims and steal their data. Also known as brand spoofing, this cyberattack uses an email that looks like it’s from a recognizable brand to trick recipients into clicking a link or downloading an attachment containing malware. Some of the most impersonated brands include Facebook, Microsoft, Google, and PayPal.

Read more ›
What is brute force?

Brute force refers to an attack that aims to gain unauthorized access to an account or encryption key. The attack method uses a trial-and-error approach in which hackers attempt to guess password combinations. Brute force attacks can be used to launch a host of malicious activities, such as harvesting data, spreading malware and ransomware, diverting website traffic, and more. While brute force attacks have existed for many years, they’ve grown more sophisticated with the aid of software that enhances the speed and accuracy of this kind of attack. Common protections against brute force attacks include anti-virus software, anti-phishing solutions, anti-malware and ransomware solutions, good cyber hygiene, and user awareness training.

Read more ›
What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) is a type of spear phishing attack in which a person impersonates a well-known contact of an employee in an attempt to have them transfer funds, reveal sensitive information, or carry out other harmful actions.

Read more ›

Ready to choose Vade for M365?