The Complete Email Security Glossary

Email security is filled with complex acronyms and rapidly evolving threats. From technical protocols like DMARC and SPF to sophisticated attacks like Business Email Compromise (BEC), understanding the terminology is the first step in defense.

We created this glossary to decode the language of cybersecurity. Use the search bar below to find a specific term, or browse by category to explore the tools, tactics, and protocols that keep organizations safe.

A
D

Data Privacy

Data privacy, crucial for cybersecurity, involves establishing policies, procedures, and controls to govern the collection, use, retention, and disclosure of sensitive customer data, ensuring adherence to regulatory compliance and preventing unauthorized access or misuse by third parties.

D

Data Protection

Data security, or information protection, encompasses the comprehensive set of policies, infrastructure, and controls—including encryption, access management, and threat detection—applied across the data lifecycle to safeguard digital assets from corruption, theft, unauthorized access, and intentional or unintentional threats.

D

Data Reconciliation

Data reconciliation is a critical cybersecurity practice involving the systematic comparison, verification, and harmonization of data sets across multiple systems to ensure integrity, consistency, and completeness. This process proactively identifies inconsistencies or anomalies that may signal security breaches, unauthorized access, or data manipulation, facilitating accurate compliance and incident response.

D

Data Retention Policy

A data retention policy is a mandatory governance framework specifying the mandated duration, secure storage mechanisms, and formal procedures for archiving, overwriting, or permanently deleting backup data to ensure compliance with legal and regulatory cybersecurity requirements, supporting incident response and auditability.

D

Data Security

Data security encompasses a rigorous framework of organizational practices, technological strategies, and defensive mitigation techniques essential for preserving the confidentiality, integrity, and availability of sensitive digital assets against unauthorized access, corruption, or malicious threats.

D

Data Security Posture Management (DSPM)

DSPM is an essential data-centric security approach for cybersecurity professionals, offering centralized visibility, continuous monitoring, and granular control over an organization's sensitive data assets across hybrid and multi-cloud environments to proactively mitigate risks and enforce compliance.

D

Data Theft

Data theft, in a cybersecurity context, constitutes the illicit extraction, copying, or acquisition of sensitive digital assets from an organization's systems or network, typically motivated by financial gain, espionage, or malicious intent to compromise operational integrity and confidentiality.

D

Data Visualization

Data visualization, for cybersecurity professionals, is the critical process of transforming vast security datasets into visual formats—such as network graphs, heat maps, and dashboards—to quickly identify threat patterns, contextualize attacks, and enable real-time analysis for effective vulnerability management and informed security measures.

D

Deepfake Technology

Deepfakes constitute highly sophisticated synthetic media, generated through advanced AI and machine learning techniques, specifically generative adversarial networks (GANs), to convincingly fabricate or alter audio, video, or images, posing significant risks for targeted disinformation, fraud, and authentication bypass in digital environments.

D

Deferred Delivery

Scheduling a malicious email to land in inboxes at 2:00 AM on a Saturday, when the SOC is at minimum staffing and response time is slower. Watch out for: Spikes in "high-risk" emails (invoices, password resets) arriving during non-business hours for the recipient's time zone.

D

Denial of Service (DoS)

An attack that prevents authorized users from accessing a network or device.

D

Digital Forensics

Digital forensics is the rigorous, systematic process of identifying, preserving, recovering, authenticating, and analyzing electronic data (ESI) from digital media, ensuring its admissibility as evidence in legal proceedings or for incident response and threat intelligence within a cybersecurity context.

D

Digital Operational Resilience Act (DORA)

The Digital Operational Resilience Act (DORA) is an EU regulation establishing a holistic, end-to-end framework for managing Information and Communication Technology (ICT) risk in the financial sector. It mandates requirements for ICT risk management, digital operational resilience testing (like TLPT), ICT-related incident reporting, and oversight of critical ICT third-party service providers.

D

Digital Risk

Digital Risk Management (DRM) is the strategic practice of identifying, assessing, and mitigating unwanted outcomes—including cybersecurity, third-party, and data privacy risks—stemming from digital technologies, platforms, and transformation initiatives, ensuring business objective continuity.

D

Digital Signature

A digital signature is a cryptographic primitive utilizing asymmetric public key cryptography—involving hashing and encryption with a private key—to definitively assure the integrity, authenticity, and non-repudiation of digital data for verification by any party possessing the corresponding public key.

D

Disaster Recovery

Disaster recovery, for cybersecurity professionals, encompasses the strategic plans, technical capabilities, and established protocols necessary to restore critical IT infrastructure, applications, and data integrity following any significant disruption, ensuring business continuity and resilience against catastrophic events.

D

Distributed Denial of Service (DDoS)

A larger version of a DoS attack where a group of attackers floods a server simultaneously.

D

Domain

A domain serves as the main unique address for a website or email system, such as @yourcompany.com. It is the primary identifier for an organization’s digital presence and acts as the "anchor" for establishing trust with other mail servers. Managing a domain effectively requires maintaining its reputation and ensuring its DNS records are correctly configured to prevent spoofing. If a domain is compromised, attackers can send authenticated-looking emails that easily bypass traditional security filters, making it a high-value target for cybercriminals.

D

Domain Spoofing

Domain spoofing is a sophisticated social engineering and cyber attack technique where malicious actors meticulously forge digital identities—such as email domains or websites—to impersonate reputable entities, thereby deceiving recipients and gaining unauthorized access or disseminating malware.

D

Double Extortion Ransomware

An attack where data is both encrypted and stolen, with threats to release it.

D

Doxing

Doxing is a deliberate, malicious cyber-attack methodology where threat actors secretly gather, research, and publicly broadcast a victim's private, identifying information—such as physical address, employment data, or financial records—without consent, often leading to harassment or real-world harm.

D

Dropper

A program designed to install malware (a virus) onto a target system.

D

Due Diligence

The care a reasonable person takes before entering an agreement.

E

E-Discovery

E-discovery is the systematic digital forensic process for identifying, preserving, collecting, processing, reviewing, and producing Electronically Stored Information (ESI) relevant to litigation or regulatory matters, focusing on maintaining the integrity and chain of custody of digital evidence.

E

Eavesdropping Attack

An eavesdropping attack, also known as sniffing or snooping, is a malicious attempt to passively or actively intercept, access, and potentially modify or delete data transmitted over a network or communication channel without authorization. This sophisticated cyberattack includes methods like network sniffing, Adversary-in-the-Middle (AitM), and VoIP interception, posing significant data security and privacy risks.

E

Effective Permissions

Rights used to grant a user specific access to objects like files or folders.

E

Electronic Communication

Electronic communication, or digital communication, is the secure and verifiable transfer of sensitive information, including data, messages, knowledge, or ideas, across networks and digital platforms, requiring stringent confidentiality, integrity, and availability controls to mitigate risks and unauthorized access.

E

Email Account Compromise (EAC)

Email Account Compromise (EAC), also known as Business Email Compromise (BEC), is a sophisticated cyberattack where criminals gain unauthorized access to a legitimate email account to execute fraudulent requests. Attackers "be you" to bypass email authentication, targeting internal parties or external partners to facilitate financial or data loss.

E

Email Archiving

Email archiving is a secure, indexed system for long-term preservation of digital communications, critical for regulatory compliance (e.g., HIPAA, FINRA), e-discovery, and maintaining data integrity. It provides a tamper-proof repository and independent backup, enhancing incident response and overall data lifecycle management.

E

Email Authentication

Email authentication is a critical security layer utilizing protocols like Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) to cryptographically verify message origin, sender legitimacy, and integrity, mitigating spoofing and phishing threats.

E

Email Deliverability

Email deliverability, in the context of security, refers to the sophisticated technical process ensuring legitimate messages successfully bypass anti-spam filters, quarantine measures, and gateway security protocols to arrive in the intended recipient's primary mailbox, signifying effective sender authentication and reputation management.

E

Email Encryption

Email encryption is a critical defensive process that employs cryptographic techniques to encode the contents and attachments of a message, ensuring confidentiality and integrity, thereby neutralizing the risk of unauthorized access, passive interception, and data exfiltration across insecure networks.

E

Email Filtering

Email filtering, in a cybersecurity context, is the systematic, automated analysis and management of inbound and outbound electronic mail traffic, utilizing advanced algorithms and threat intelligence to apply policy controls, detect malware, spam, phishing attempts, and ensure compliance with regulatory standards and organizational security posture.

E

Email Impersonation Attacks

Email impersonation is a social engineering phishing vector where threat actors forge the sender's address to masquerade as a trusted entity (e.g., executive, vendor, or employee) to deceive recipients and facilitate fraudulent activities or credential theft.

E

Email Protection

Email protection is a critical cybersecurity discipline integrating advanced technical controls—such as gateway filtering, encryption, and authentication protocols—with comprehensive organizational training to mitigate email-borne threats, including phishing, malware, and sophisticated social engineering attacks targeting network infiltration and data compromise.

E

Email Scams

Email fraud is a broad category of deceptive cyber attacks executed via electronic mail, designed to maliciously acquire sensitive data, financial assets, or unauthorized system access, often employing sophisticated social engineering tactics targeting organizational security posture.

E

Email Security

Email security encompasses a defensive architecture of layered technologies, established protocols, and governance policies systematically implemented to safeguard electronic mail systems and contents against sophisticated cyber threats, ensuring the persistent confidentiality, structural integrity, and assured availability of critical communication channels.

E

Email Spoofing

Email spoofing is a malicious act of impersonation where the sender manipulates email headers to make a message appear to originate from a trusted source or entity. This technique is routinely leveraged in phishing campaigns and spam distribution to deceive recipients, bypass security controls, and facilitate credential theft or malware delivery.

E

Encryption

Encryption is a foundational cryptographic technique involving the systematic transformation of plaintext data into an unreadable ciphertext format using an algorithm and key. This process ensures data confidentiality and integrity, restricting access exclusively to authorized entities possessing the correct decryption key, thereby mitigating unauthorized disclosure.

E

End User Monitoring

End user monitoring is a critical cybersecurity practice that continuously tracks real-time user interactions with web applications and IT services, collecting metrics from devices to analyze site performance, identify connection methods, detect errors, and log user behavior for comprehensive analytics and threat detection.

E

Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is a sophisticated cybersecurity framework that continuously monitors endpoint activity, utilizing advanced analytics and automation to proactively identify, investigate, contain, and remediate known and unknown threats, providing deeper visibility into the threat landscape.

E

Endpoint Protection

The process of protecting devices like laptops and smartphones from cyber attacks.

E

Endpoint Security

Endpoint security is a comprehensive defense strategy involving integrated software, hardware, and policies to protect all end-user devices—like laptops, mobile devices, and IoT—connected to a network or cloud, offering advanced capabilities such as EDR, antimalware, and centralized management against zero-day threats and sophisticated cyberattacks to safeguard corporate assets.

E

Endpoint-Delivered Threats

Endpoint-delivered threats are vectors where malicious payloads breach a corporate network via compromised user assets, including infected personal or portable devices enabling lateral movement, or through social engineering tactics that manipulate users into installing rogue security or utility software.

E

Enterprise Security

Enterprise security is the comprehensive framework of technological, procedural, and policy-driven defenses implemented across an organization's infrastructure to protect assets, data, and systems from internal and external threats, ensuring business continuity and compliance with regulatory mandates.

E

Entropy Scanning

Using math to measure the "randomness" of an email attachment; high entropy usually indicates that the file is encrypted or "packed" with a malicious payload. Watch out for: Attachments with an entropy score near 8.0, which indicates the file is likely a hidden executable or encrypted archive.

E

Exploit

A tool or code used to take advantage of a security weakness in a system.

E

Extended Detection and Response (XDR)

Extended Detection and Response (XDR) is a comprehensive, unified security operations platform that leverages advanced artificial intelligence and machine learning to proactively detect, analyze, and automatically orchestrate responses to sophisticated cyber threats across disparate security layers, including endpoint, network, cloud, and email infrastructure, providing superior threat visibility and efficiency for security teams.

F

FERPA Compliance

The Family Educational Rights and Privacy Act (FERPA) mandates stringent protection of student educational records and personally identifiable information (PII). It requires robust cybersecurity measures, including data encryption, access controls, incident response planning, and accountability for non-compliance, risking loss of federal funding.

F

False Negative

When a security tool fails to catch a real threat.

F

False Positive

When a security tool mistakenly labels safe activity as malicious.

F

Fast-Flux DNS

A technique where a phishing domain cycles through hundreds of different IP addresses every few minutes to evade IP-based blocking. Watch out for: A single phishing URL that resolves to a different global IP address every time your SOC analysts attempt to "ping" or scan it.

F

FedRAMP

The Federal Risk and Authorization Management Program (FedRAMP) is a mandatory, government-wide compliance framework establishing standardized security assessment, authorization, and continuous monitoring requirements for Cloud Service Providers (CSPs) seeking to contract with U.S. federal agencies, ensuring adequate protection of sensitive government information hosted in the cloud.

F

Fileless Malware

Malware that exists only in the computer's memory (RAM), evading traditional antivirus.

F

Firewall

A firewall is a critical network security apparatus deployed to monitor, filter, and control incoming and outgoing network traffic based on an established set of security policies, effectively creating a defensive perimeter against unauthorized access and malicious network threats.

G

GDPR

The GDPR is the EU regulation mandating stringent protection for personal data of EU citizens, requiring organizations globally to implement robust technical and organizational security measures, uphold data processing principles like purpose limitation, and guarantee comprehensive data subject rights, including the right to erasure and portability.

G

GameOver Zeus (GOZ)

Zeus is a sophisticated family of financial malware, first identified in 2005, primarily engineered for credential theft. An evolution includes GameOver Zeus, a highly advanced variant characterized by its decentralized peer-to-peer communication structure and the incorporation of a significant ransomware payload.

G

Generative AI

Generative AI (GenAI) is a class of AI systems capable of creating novel content, including code and synthetic data, which is transforming cybersecurity by enhancing threat detection, response, and defense strategies, while also presenting risks like adversarial attacks, data leakage, and sophisticated, adaptive malware development by threat actors.

G

Graymail

In cybersecurity, graymail refers to high-volume, solicited email correspondence originating from legitimate sources that, while not classified as malicious spam, possesses subjective value across recipients, often contributing significantly to inbox clutter and potential data security concerns through reduced vigilance.

G

Greylisting

Greylisting is a specific spam defense mechanism that temporarily rejects email from unknown senders. When a new server tries to send an email, the greylisting system returns a "try again later" message. Legitimate mail servers are programmed to automatically retry the delivery after a short delay, at which point the email is accepted. However, because many spam bots are designed for speed and do not bother to retry, greylisting effectively filters out a large volume of automated junk mail before it enters the inbox.

H

HIPAA Compliance

HIPAA compliance, under the U.S. Health Insurance Portability and Accountability Act, mandates rigorous implementation of physical, administrative, and technical safeguards across network infrastructure and operational processes to ensure the confidentiality, integrity, and availability of Protected Health Information (PHI).

H

Hacking

Hacking, in a professional cybersecurity context, involves the deliberate act of circumventing security protocols and exploiting systemic vulnerabilities within computer networks, applications, or infrastructure to illicitly compromise systems, achieve unauthorized access, escalate privileges, or exert control over digital assets.

H

Hacktivism

Hacktivism is the use of computer technology and hacking methods, such as Denial-of-Service attacks or website defacement, by political or social activists to achieve an ideological agenda or make a public statement against entities they perceive as unethical, oppressive, or harmful, often during geopolitical unrest.

H

Honeypot

A cybersecurity honeypot is a controlled, isolated network resource or system designed as a decoy to lure, trap, and study adversarial tactics, techniques, and procedures (TTPs) and gather threat intelligence without impacting production environments.

H

Honeypot Address

A "fake" email address that is never used but is published in hidden spots online to catch and analyze automated scraping and spam bots. Watch out for: Any inbound mail sent to an address that has never been assigned to a human, as it is 100% confirmed malicious traffic.

H

Human Firewall

A human firewall is the critical, proactive security measure achieved through comprehensive and continuous training of all personnel, establishing the collective workforce as the primary behavioral defense layer against sophisticated social engineering and various cyber threats.

H

Human Risk Management

Human Risk Management (HRM) is a strategic, data-driven cybersecurity methodology that comprehensively identifies, quantifies, and proactively mitigates the systemic security vulnerabilities originating from human behaviors, ensuring alignment with organizational risk tolerance and compliance objectives.

H

Human-Centric Security

Human-centric security is a holistic cybersecurity methodology that deliberately shifts the focus from purely technical controls like networks or endpoints to prioritize people and their behaviors, proactively integrating threat defense, context-aware data protection, and continuous behavioral reinforcement to mitigate risks and enhance overall security posture.

I

IMAP (Internet Message Access Protocol)

The Internet Message Access Protocol (IMAP) is a standard protocol used by email clients to retrieve messages from a mail server. Unlike older methods, IMAP keeps messages on the server, allowing users to synchronize their mailboxes across multiple devices, such as laptops and smartphones. While this provides significant convenience for modern remote work, it also increases the security risk; since the server remains a constant repository for all user data, it must be rigorously protected against unauthorized access attempts and credential theft.

I

IOC (Indicator of Compromise)

Evidence that suggests a security breach has occurred.

I

IP Address

An Internet Protocol (IP) address is a unique string of numbers separated by periods that identifies every computer or device communicating over a network. In the realm of email security, the sender's IP address is a primary data point used to verify legitimacy. Security tools track the reputation of these addresses; if an IP has a history of sending spam or malware, it is often blocked by global providers. Identifying unusual or suspicious IP addresses is also a key indicator of a potential security breach.

I

IP Reputation

IP reputation is a critical cybersecurity metric that quantifies the historical trustworthiness of a specific internet address, evaluating its propensity for malicious behavior like spamming, malware distribution, or network attacks, which informs security enforcement actions.

I

IP Reputation Warm-up

The process of gradually increasing email volume from a new IP to build trust with ISPs; attackers "hijack" warmed-up IPs to send phishing. Watch out for: A sudden shift in the "Tone" or "Content Type" coming from an IP that previously only sent low-volume, benign administrative alerts.

I

IT Compliance

IT compliance involves adherence to mandated regulatory standards, internal policies, and legal frameworks, ensuring an organization's systems, data handling, and operational procedures maintain integrity, confidentiality, and availability, thereby mitigating security risks and avoiding penalties.

I

Identity Security

Identity security is a critical cybersecurity discipline focused on safeguarding digital identities—of users, devices, and organizations—by implementing policies, tools, and processes like MFA and IAM to manage secure access, enforce zero trust principles, defend against identity-based threats, and ensure regulatory compliance.

I

Identity Security Posture Management (ISPM)

Identity Security Posture Management (ISPM) is a continuous, risk-based cybersecurity framework dedicated to assessing, monitoring, and optimizing the integrity of digital identities, access credentials, and privileges across an enterprise infrastructure to proactively mitigate risks, including credential theft and account takeover.

I

Identity Theft

Identity theft is the unauthorized acquisition and use of an individual's personally identifiable information (PII), such as names, SSNs, financial account numbers, or credentials, to facilitate fraudulent activities, financial gain, or other criminal enterprises, posing a significant threat to data security and privacy.

I

Identity Threat Detection & Response (ITDR)

Identity Threat Detection and Response (ITDR) is a dedicated cybersecurity framework and solution set focused on actively monitoring, detecting, and responding to threats targeting identity and access infrastructure, such as Active Directory and IAM tools, ensuring proactive defense against credential misuse, privilege escalation, and lateral movement by adversaries.

I

Identity and Access Management (IAM)

Identity and Access Management (IAM) is a critical cybersecurity discipline that establishes a comprehensive framework of governance, protocols, and technical solutions for the secure lifecycle management of digital identities and the enforcement of least-privilege controls over access to sensitive organizational assets.

I

Immutable Backups

Immutable backups are a critical cyber resilience measure, creating unalterable, read-only data copies for a defined retention period, effectively safeguarding against modification, encryption, or deletion by ransomware, insider threats, or accidental actions, thus ensuring a pristine recovery point.

I

Incident Response

Incident response is the proactive and structured process for identifying, analyzing, containing, eradicating, and recovering from cybersecurity threats or breaches that exploit vulnerabilities within an organization's systems, ensuring business continuity and minimizing impact.

I

Indicators of Compromise

Indicators of Compromise (IoC) are technical artifacts or observables—such as network anomalies, unexpected configuration changes, or unauthorized software installations—that provide high-confidence evidence to cybersecurity professionals that a computer intrusion or security compromise has occurred or is imminent.

I

Information Seeking Scams

Phishing attacks involve malicious actors employing deceptive email tactics to manipulate recipients into divulging sensitive data, such as credentials or financial information, representing a significant social engineering threat.

I

Infrastructure as a Service (IaaS)

IaaS, or Infrastructure as a Service, provides essential computing resources—servers, storage, and network components—over the internet. For cybersecurity professionals, this means managing security controls and compliance responsibilities at the operating system and application layers, while the cloud provider secures the underlying physical infrastructure.

I

Insider Risk

Insider risk is the potential for any individual with authorized access—including employees, contractors, or third parties—to intentionally or unintentionally compromise an organization's mission, resources, data, networks, or systems, leading to negative impacts like financial loss, reputational damage, or compliance failure.

I

Insider Threat

An insider threat involves an individual with authorized access, such as an employee or contractor, intentionally or inadvertently leveraging that access to compromise the confidentiality, integrity, or availability of an organization's critical systems, sensitive data, or intellectual property, necessitating continuous monitoring and robust security controls.

I

Integrated Cloud Email Security (ICES)

Integrated Cloud Email Security (ICES) is an advanced layer of email protection that supplements and enhances the native security features of leading cloud-based email platforms like Microsoft 365 and Google Workspace, providing robust defense against sophisticated threats such as phishing, malware, and business email compromise (BEC).

I

Intellectual Property Theft

Intellectual property (IP) theft is the unauthorized use, exploitation, reproduction, or distribution of protected creative works, trade secrets, source code, patented innovations, and proprietary data. For cybersecurity professionals, this also encompasses license misuse and digital infringement, posing significant legal, financial, and reputational risks to organizations.

I

Internet Cookies

Internet cookies are small data packets sent by web servers and stored by a user's browser, fundamentally used to manage HTTP sessions (a stateless protocol), personalize experiences, and track user behavior. For cybersecurity, these text files are vital due to their role in storing authentication and session data, making them targets for cybercriminals.

I

Intrusion Detection System (IDS)

An Intrusion Detection System (IDS) is a critical security control, implemented as hardware or software, that continuously analyzes network traffic and system operational metrics to identify and flag patterns indicative of policy violations, unauthorized lateral movement, or active malicious exploitation, providing real-time situational awareness.

I

Intrusion Prevention System (IPS)

An Intrusion Prevention System (IPS) is an essential, proactive network security control that performs deep packet inspection to analyze network traffic patterns in real-time, swiftly identifying and actively blocking or mitigating unauthorized access, sophisticated malicious exploits, and various network threats before they can compromise system integrity or data confidentiality.

I

IoT (Internet of Things)

The Internet of Things (IoT) comprises interconnected physical devices that automatically communicate via the cloud, often using resource-limited, unpatched operating systems, presenting critical cybersecurity risks like weak authentication, lack of encryption, and firmware vulnerabilities, demanding robust security protocols.

I

IoT Security

IoT security is a critical cybersecurity strategy encompassing safeguards and protocols to protect connected devices, associated networks, and sensitive data from cyberattacks and breaches. It addresses vulnerabilities like weak authentication, unpatched firmware, and unencrypted communications across diverse endpoints, requiring measures such as network segmentation, strong encryption, and zero-trust frameworks.

J

JA3 Fingerprint

A method for identifying the specific client software (like a malicious bot) by fingerprinting its TLS handshake during an email connection. Watch out for: Incoming SMTP connections with a JA3 hash that matches known "Emotet" or "Trickbot" infrastructure rather than a standard Outlook/Gmail client.

J

JA4+ Fingerprinting

The next-gen version of JA3 that includes TCP and HTTP characteristics to identify malicious email senders with higher fidelity. Watch out for: Incoming mail from a "Standard Browser" that has a network fingerprint of a "Python Script," indicating an automated attack bot.

K

Kerberoasting Attacks

Kerberoasting is an advanced, post-exploitation attack wherein threat actors target Active Directory (AD) environments by requesting service ticket grant access (TGS) for service principal names (SPNs) associated with service accounts. Attackers then extract and crack the encrypted credentials offline to escalate privileges and move laterally within the network.

K

Keyloggers

A keylogger is a stealthy form of surveillance technology, implemented as hardware or software, designed to clandestinely capture and record the sequential keystrokes input by a user on any computing device, posing a significant risk for credential theft and unauthorized data exfiltration.

K

Kill Chain

A model describing the stages of a cyber attack, from reconnaissance to data theft.

L

Large Language Models (LLMs)

LLMs are sophisticated AI architectures, leveraging deep learning on massive text corpora to facilitate advanced natural language processing. For cybersecurity professionals, understanding these models is critical as they present both new defense tools and potential vectors for complex social engineering and automated attacks.

L

Lateral Movement

Lateral movement is a post-compromise technique utilized by attackers to propagate through a network, involving the exploitation of credentials and misconfigurations to access and control systems beyond the initial intrusion point, enabling reconnaissance and objective fulfillment.

Don’t Miss the Next Big Threat
Subscribe today to receive updates on the newest cyberattacks, product innovations, and best practices for protecting your organization.

Subscribe

Success! We’ll be in touch soon.
Something went wrong while submitting.