Cybersecurity Glossary

To implement effective cybersecurity solutions built for the digital world, it’s important to understand common industry concepts and definitions. This glossary provides you with cybersecurity terms to be aware of as you look to protect your organization against cyber threats.

Wannacry Ransomware

Wannacry Ransomware is a type of ransomware worm that can quickly infect many devices and encrypt sensitive information. After critical files have been encrypted, cybercriminals will then demand a ransom to decrypt the compromised data. Wannacry Ransomware came onto the scene in 2017, when computers all over the world running Windows were compromised via network vulnerabilities and users were asked to make ransom payments in the Bitcoin cryptocurrency. Wannacry Ransomware can spread incredibly fast, making it a major threat to organizations that have potential security gaps in their IT infrastructure.

Web proxy server

A web proxy server is a system or router that acts as an intermediary between users and the internet. A web proxy server provides a layer of security that helps prevent cybercriminals from entering a private network. Organizations use proxy servers for a variety of reasons, including controlling what websites employees can access, changing IP addresses and hiding end-user Internet activity from third parties, and improving network performance while saving bandwidth. While web proxy servers help protect against cyberthreats like malware, they still present vulnerabilities. That’s why web proxy servers are most effectively used in combination with other cybersecurity solutions, such as email security.


Whaling is a type of phishing attack in which threat actors target senior executives by posing as a legitimate business or partner. In this type of attack, hackers commonly target C-level executives to initiate a wire transfer or obtain sensitive information. Hackers exploit victims by sending emails that contain phishing links or malicious attachments. Whaling is often highly targeted and uses personal information about the intended victim to tailor attacks, making them more effective than traditional phishing campaigns.

Extended Detection and Response (XDR)

XDR (Extended Detection and Response), is a cross-layered cybersecurity tool used by organizations to enhance the security posture of their entire infrastructure. With greater oversight and visibility of data across a multitude of sources, XDR enables organizations to better identify and respond to cybersecurity threats in a more streamlined fashion. XDR makes it possible to achieve a birds-eye view of your cybersecurity posture, while lessening the manual burden placed on cybersecurity personnel to ensure airtight security. An effective XDR strategy enhances the detection and response capabilities of your organization which is crucial in order to minimize security lapses between your cybersecurity solutions.

Zero day exploit

A zero day exploit is a method used by hackers to perform a cyberattack through a security vulnerability. Zero-day exploits take advantage of new software patches or undisclosed security risks to steal sensitive information or damage computer systems. These types of exploits require prompt remediation, since you essentially have “zero days” to patch the exposed security vulnerabilities.

Zero trust

A zero trust security model is predicated on the idea that networks need to be protected from both external and internal threats. While historically, organizations have put most of their cybersecurity efforts into thwarting attacks from individuals outside the company, the zero trust model proposes that effective cybersecurity means verifying and authenticating all individuals that interact with sensitive information.

Insider threats have steadily increased in recent years, which is why many organizations are now continuously monitoring access privileges and ensuring only users have access to the systems they need. Maintaining strict access controls helps improve the security posture of your organization and protects against all threats, whether they be inside or outside your perimeters.

Ready to choose Vade for M365?