Glossary
Lure
An attack lure, often used in phishing campaigns, is a ploy where cybercriminals bait their targets to convince them to share sensitive information – either delivered through a phone call, text message, or email.
Machine Learning (ML)
An AI-powered algorithmic approach to building models based on a set of features and a training set of examples in order to make accurate data-driven predictions or decisions on new examples or information that comes in.
Mail-focused Security Orchestration, Automation, and Response (mSOAR)
This mail-focused type of software automates repetitive tasks and streamlines incident and threat response workflows, and most importantly, can be integrated into email security solutions to support security operations teams operations.
Malware
Malicious software used by threat actors to gain unauthorized access to information or systems via email, hyperlinks, apps, website links, etc., with the goal of leaking sensitive information or denying legitimate users access to their own information.
Man-in-the-Middle Attack (MITM)
Misdirected Emails
Also called Accidental Data Loss; This is when an email that is meant for a particular person or party is sent to the wrong person with body content or attachments that may contain personal data, such as PII.
Natural Language Processing (NLP)
A tool used in cyber threat intelligence which seeks to identify and analyze the motives and operations of threat actors by extracting valuable insights from textual data.
Neural Networks
These are useful in email security, where a broad range of file types, images, text, etc. are encounteredm to learn complex patterns and features automatically and capture subtleties and nuances that would be missed by feature-engineered models.
On-premises (On-prem)
Password Cracking
Also referred to as Password Hacking; The process in which bad actors go through to hack, or get into computer systems illegally, in order to steal, corrupt, or illegitimately view personal data; in this case, by cracking passwords.
Personally Identifiable Information (PII)
Phishing
Phishing Simulation
Post-delivery
Pre-delivery
QR Code Phishing
Also called Quishing; A newer form of phishing attack that features a hyperlink embedded in a QR code that brings the user to a fraudulent or malicious website that when logged into, is used for credential harvesting.
Ransomware
Sandbox
Sanitization
Secure Email Gateway (SEG)
Security Awareness Training (SAT)
Security Information and Event Management (SIEM)
Security Operations Center (SOC)
Sender Policy Framework (SPF)
SPF is an email authentication protocol that domain owners use to specify the email servers they send email from, making it harder for fraudsters to spoof sender information
Simple Mail Transfer Protocol (SMTP)
SMS Phishing
Also called Smishing; A newer form of phishing attack, or business email compromise, initiated with an email sent to a prospective victim written to elicit a response with the recipient's cell phone number so the scammer can access their cell phone and applications.
Social Engineering
Spam
A broad category of unsolicited commercial bulk email sent out vast recipient lists; often referred to as junk email.
Spear Phishing
Threat Actor
Sometimes referred to as Bad Actor or Cybercriminal; These are individuals or groups of cybercriminals that intentionally cause harm to digital devices or systems by creating coordinated attacks or campaigns to email users in order to trick them into giving away personal data or corporate digital assets.
Threat Intelligence
Threat Mitigation
Typosquatting
Also called Cybersquatting, URL Hijacking, Sting Site, or Cousin Domain; The malicious technique of registering a domain name that is deceptively similar to a target name, like a brand or company's, that exploits user trust in order to spur the recipient to act or respond.
URL Rewriting
The precautionary measure of rewriting and replacing URL addresses so that security teams can perform a preliminary scan to make sure there is no malicious content embedded before the user launches or visits it.
Voice Phishing
Also called Voicemail Phishing or Vishing; A form of phishing attack that features a link to what looks like a voice message that brings the user to a fraudulent or malicious website that when logged into, provides an ingress to the portal and is used for credential harvesting.
Whale Phishing
Pagination
- Previous page
- Page 2
- Next page