Your Home For Cyber Security News, Stories, & Tutorials

Firewalls.com’s Comprehensive Cyber Threat Dictionary

Cyber threats lurk around every corner in today’s online world, and more sophisticated attacks are created each day to bypass your defenses. The first step in stopping these threats is understanding what they are, how they work, and what vulnerabilities they’re targeting. That’s why Firewalls.com compiled the Threat Dictionary, an A to Z guide to the dangers your organization faces every day. The next step after understanding the threats? Strong network protection.

Shop Firewalls from Top Network Security Brands

A

Adaptive Ransomware Attack

Advanced Persistent Threat

Adware

Anonymizing Proxy

Atom Bombing

Auto-Run Worm

B

Backdoor Trojan

Boot Sector Malware

Botnet

Browser Hijacker

Brute Force Attack

Buffer Overflow

Business Email Compromise (BEC)

C

Code Caving

Command & Control Center

Cookie

Credential Threat

D

Data Leakage

Data Loss

Data Theft

Denial-Of-Service Attack

DNS Hijacking

Document Malware

Drive-By Download

Dropper

E

Email Malware Distribution

Evil Twin Attack

Exploit

F

Fake AntiVirus Malware

Fileless Malware

Formjacking

G

GandCrab Ransomware

H

Hacktivism

Hollow Process

Honeypot

I

Internet Worm

J

Junkware

K

Keylogger

L

Logic Bombs

M

Macro Malware

Malicious Process Migration

Malware

Man-In-The-Middle Attack

Mobile Malware

MongoLock

N

Network Sniffing

O

Obfuscation

P

Parasitic Virus

Patches

Phishing

Potentially Unwanted Applications (PUA)

Process Privilege Escalation

Q

Quarantine

R

Ransomware

Remote Access Trojan

Remote Code Execution

Rogue Access Point

Rootkit

S

Shellcode

Social Engineering

Spam

Spearphishing

Spoofing

Spyware

SQL Injection

T

Time-Of-Check-Time-Of-Use

Trojan

U

URL Injection

Use After Free (UAF)

V

Virus

Vulnerability

W

Watering Hole

Whaling

WiFi Eavesdropping

Wiper Attacks

X

XSS

Y

You

Z

Zero-Day Exploit

Zombie