Global Cyber Intelligence Encyclopedia
[ INDEXING THREAT VECTORS, PROTOCOLS, AND DEFENSIVE STRATEGIES ]
OSINT (Open Source Intelligence)
The practice of collecting information from publicly available sources for intelligence purposes.
Zero Trust Architecture (ZTA)
A security framework requiring all users to be authenticated and continuously validated. “Never trust, always verify.”
SIEM (Security Information and Event Management)
Software providing real-time analysis of security alerts generated by applications and network hardware.
Honeypot
A decoy system intended to mimic a target to detect, deflect, or study unauthorized use of systems.
Air Gap
A network security measure ensuring a secure computer network is physically isolated from unsecured networks.
Digital Forensics
The recovery and investigation of material found in digital devices, often for legal evidence.
APT (Advanced Persistent Threat)
A prolonged, targeted attack where an intruder gains access to a network and remains undetected.
SQL Injection (SQLi)
Exploiting application vulnerabilities to manipulate backend databases via malicious SQL statements.
Cross-Site Scripting (XSS)
Injecting malicious client-side scripts into web pages viewed by other users.
Buffer Overflow
An anomaly where a program overruns the buffer’s boundary and overwrites adjacent memory locations.
DDoS (Distributed Denial of Service)
Disrupting a server by overwhelming it with a flood of Internet traffic from multiple sources.
Man-in-the-Middle (MitM)
An attacker secretly relays and alters communication between two parties who believe they are talking directly.
Ransomware
Malware that encrypts files and demands a ransom payment for the decryption key.
Rootkit
Software designed to hide its presence and maintain privileged access to a system undetected.
Spear Phishing
A highly targeted phishing attack aimed at a specific individual, group, or organization.
CSRF (Cross-Site Request Forgery)
Tricking a victim into submitting a malicious request to a web application they are authenticated in.
SSRF (Server-Side Request Forgery)
Abusing server functionality to read or update internal resources that are not intended to be public.
LFI/RFI (File Inclusion)
Attacks that allow an attacker to include local or remote files on a server, often leading to code execution.
DNS Poisoning
Exploiting vulnerabilities in DNS to redirect traffic from legitimate servers to malicious ones.
ARP Spoofing
Sending fake ARP messages onto a LAN to associate the attacker’s MAC address with a legitimate IP.
Credential Stuffing
Automated login attempts using lists of compromised user credentials from other breaches.
Password Spraying
Testing a few common passwords against a large number of user accounts to avoid account lockout.
Supply Chain Attack
Infiltrating a system through an outside partner or provider with access to your data or systems.
SIM Swapping
A type of identity theft where an attacker convinces a carrier to switch a victim’s number to their SIM.
Zero-Day Exploit
An attack that targets a software vulnerability which is unknown to the vendor and has no patch.
RAT (Remote Access Trojan)
Malware that includes a back door for administrative control over the target computer.
Keylogger
A surveillance tool used to record every keystroke made on a keyboard.
Cryptojacking
Unauthorized use of someone else’s computer to mine cryptocurrency.
Side-Channel Attack
An attack based on information gained from the implementation of a computer system (e.g. power, heat).
Bluejacking / Bluesnarfing
Attacks targeting Bluetooth-enabled devices to send spam or steal data.
Juice Jacking
Cyberattack involving a charging port that doubles as a data connection, installing malware.
Clickjacking
Deceiving a user into clicking on something different from what the user perceives.
Baiting
Using a false promise to pique a victim’s greed or curiosity (e.g., leaving a malicious USB drive).
Vishing & Smishing
Phishing attacks conducted via voice (phone) or SMS (text messages).
Directory Traversal
An HTTP attack which allows attackers to access restricted directories and execute commands.
Steganography
Hiding secret information within a non-secret file or message to avoid detection.
Evil Twin
A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.