POS SHopping Cart

Restaurant Ordering Platforms Targeted By Hackers

Secure your business with CyberHoot Today!!! Sign Up Now Customers from over 300 restaurants’ had payment card details stolen in web-skimming campaigns targeting three online ordering platforms. Web-skimmers, or Magecart …

html smuggling cybrary

HTML Smuggling

Secure your business with CyberHoot Today!!! Sign Up Now HTML Smuggling is an evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features to deploy banking malware, Remote Access …

monero cyber criminals

Monero – The New Crypto For Hackers

Cybercriminals had a wake-up call after the FBI successfully breached a cryptocurrency wallet held by the Colonial Pipeline hackers by following the money trail on bitcoin’s public blockchain. The FBI …

airtag attack

Apple AirTag Attack

In April of 2021, Apple unveiled the AirTag, a tracking device that can be put on nearly anything so users don’t lose their valuables. Users frequently use these on their …

Outlook Password Flaw in Autodiscover

Outlook “Autodiscover” Leaking Passwords

Cybersecurity experts at Guardicore published a report summarizing its research results involving security concerns in Microsoft “Autodiscover” feature. Their report states they were able to collect over a 372,072 domain …

japanese crypto exchange robbed

Japanese Crypto Exchange Robbed of $100,000,000

Recently, cryptocurrency exchanges, the place where you can buy and sell cryptocurrencies on the Internet, have been under active and successful attack. In one case, a Chinese cryptocurrency exchange called …

vishing bazarcaller

BazarCaller – Vishing Gang

BazarCaller is a new cybercrime gang that uses Vishing to trick its victims into handing over information or access to a device. Vishing is the malicious practice of making phone …

SIM Swapping cyber security

SIM Swapping

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that number to a different SIM card in a different cell phone in …

scrpit kiddie cybrary term

Script Kiddie

A Script Kiddie, also known as a skiddie, or skid; is an unskilled individual who uses scripts or programs developed by other individuals to attack computer systems and networks as …

organized crime word map definition

Organized Crime

Organized Crime refers to a category of hackers that may be transnational, national, or local in geography.  They operate like a centralized enterprise but are run by criminals who engage in …

nation state hacker group

Nation State Hackers

Nation State hackers are the best of the best.  Their attacks are evolving and are not often seen or discussed in the day-to-day world because attribution of an attack to …

Cloud Computing

Cloud Computing is a model for enabling on-demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be …

Computer Network Defense

Computer Network Defense is the actions taken to defend against unauthorized activity within computer networks. Some examples of network defenses are firewalls, demilitarized zones (DMZs), Virtual Private Networks (VPNs), and …

Built-In Security

Built–In Security is a set of principles, practices, and tools to design, develop, and evolve information systems and software that enhance resistance to vulnerabilities, flaws, and attacks. A simple example …

Authorization

Related Terms: Access Control, Access Control Mechanism, Authentication Source: OASIS SAML Glossary 2.0; Adapted from CNSSI 4009 What Does This Mean for my SMB?  It’s vital to ensure that your …

Authentication

Authentication is the process of verifying the identity or other attributes of an entity (user, process, or device). Entering in log in credentials to gain access to a website is …

Moth in the Mark II

Bug

A Bug is an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device. These small defects or faults are generally due to human error when …

Access Control Mechanism

Access Control Mechanism

An access control mechanism is a security safeguard (i.e., hardware and software features, physical controls, operating procedures, management procedures, and various combinations of these) designed to detect and deny unauthorized …

blacklist cybrary

Block List, Deny List

A Block List or Deny List, (deprecated: Blacklist), is a list of entities that are blocked or denied privileges or access. Hosts or applications that have been previously determined to …

Active Content

Active Content

Active content is software that is able to automatically carry out or trigger actions without the explicit intervention of a user. When you are visiting a webpage on the Internet, …

Attack

An Attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. In other words, the intentional act of attempting …

Attacker

An Attacker is an individual, group, organization, or government that executes an attack.  Not to be confused with a vulnerability.  An attack in the physical world might be someone who …

Digital Forensics

Digital Forensics is the processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes. In the NICE Workforce Framework, cybersecurity work where a person: …

Bot, Botnet, Bot Herder, and Bot Master

Bot(s) A Bot is a computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of …

Denial of Service (DoS)

Denial of Service (DoS) is an attack that prevents or impairs the authorized use of information system resources or services. A DoS is simply when hackers try to prevent legitimate …

Data Breach

A Data Breach is the unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information. What …

Firewall

A firewall is a capability to limit network traffic between networks and/or information systems. This is a hardware/software device or a software program that limits network traffic according to a …

Hacker

A hacker is an unauthorized user who attempts to or gains access to an information system. This is someone who uses various methods to breach defenses and exploit weaknesses in …

Cybersecurity

Cybersecurity

Cybersecurity is the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use …

Authenticity

Authenticity

Authenticity is a property achieved through cryptographic methods of being genuine and being able to be verified and trusted, resulting in confidence in the validity of a transmission, information or …

malicious code cybrary

Malicious Code

Secure your business with CyberHoot Today!!! Sign Up Now Malicious Code is harmful computer code or web script designed to create system vulnerabilities leading to backdoors, security breaches, information/data theft, …

Availability

Availability is one of three security terms in the trifecta of data protection. The other two being Integrity and confidentiality.

Confidentiality

Confidentiality is one of three critical data protections in cybersecurity. The other two are Integrity and Availability.  (see links below for those Cybrary pages).  Confidentiality seeks to ensure that information …

Digital Signature

A Digital Signature is a value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data. This is essentially …

Ciphertext

Ciphertext is data or information in its encrypted form. Ciphertext is the output when an encyption process is deployed. Encryption is done when important information must be safeguarded against attackers. …

Cryptography turns Plaintext into Ciphertext

Cryptography

Cryptography is the use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication. Cryptography is the science that converts plaintext into …

blue team cybrary

Blue Team

Secure your business with CyberHoot Today!!! Sign Up Now A Blue Team ‘defends’ in a Red/Blue team exercise. Modeled after military training exercises, this activity is a face-off between two …

Cryptographic Algorithm

A Cryptographic Algorithm is a well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output. What Does This Mean For An SMB? Your business needs …

Virus

A virus is a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer. An example …

Chip and Pin Benefits Video Training

Chip and Pin Benefits Training

All credit and debit cards are now being made with “a computer that is 1/4 the size of a postage stamp” this technology we know as a chip card. Chip …

Continuity of Operations Plan

Continuity of Operations Plan (COOP) is a document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption or potential disruption. What Should …

Phishing

Phishing is a digital form of social engineering to deceive individuals into providing sensitive information. This is typically done via email, having people click on links that allow hackers to …

Adversary (or Attacker)

An Adversary is an individual, group, organization, or government that conducts or has the intent to conduct malicious activities. An example of an adversary would be a hacker, an attacker, …

Antivirus Software

Antivirus Software is a program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes done by …