Glossary

Explore Flare Cybersecurity 101

A

Artificial Intelligence (AI)  in threat intelligence refers to the use of artificial intelligence technologies and techniques to improve the detection, analysis, and response to cyber threats. AI threat intelligence automates the process of collecting and...

Artificial intelligence (AI) in cybersecurity, or AI cybersecurity, strategically combines AI technologies with cybersecurity systems. This means using AI’s advanced algorithms and data processing capabilities to enhance an organization’s detection, prevention, and response to cyber...

B

There are no glossary articles for this letter.

C

Cyber threats are constantly changing. Criminals are always coming up with new and more effective malware, coming up with new ways to infiltrate cyber defenses, and finding novel ways to socially engineer attacks. With an...

Credential stuffing prevention keeps attackers from using stolen or leaked user IDs and passwords to gain unauthorized access to an organization’s systems, networks, and data. Typical ways to mitigate credential stuffing attack risk include requiring...

Continuous Threat Exposure Management (CTEM) represents an evolutionary step in cybersecurity, focusing on proactive threat identification and management. It continuously monitors and analyzes an organization’s digital assets to identify vulnerabilities, assess risks, and prioritize remediation...

D

Domain monitoring tools collect data from various sources, including domain registrars and web logs, to monitor for potentially malicious domain registrations that threat actors use to steal data. By incorporating threat intelligence into domain monitoring...

The dark web is the part of the internet that is not indexed by search engines, and one that you can’t access with a traditional browser. It’s also a hub for cybercriminal activity; threat actors...

The Internet is vast, and only the smallest fraction of it is indexed and visible to the general public; the rest of it (between 90 and 99 percent) is the deep web. Given that criminals...

Data breach can result in the loss of sensitive information, such as customer data, financial information, or intellectual property. This can lead to financial losses, reputational damage, and legal liability. However, data breaches can be...

The digital threat landscape has become increasingly complex and sophisticated over the past few years. Organizations’ sensitive information can get leaked or stolen, then taken advantage of by threat actors.  Incorporating a digital risk protection...

A Guide to Data Leakage Prevention Tools Data is your organization’s most important asset, so when it leaks, it’s critical to catch that leak quickly. It’s even more important to prevent leaks from happening in...

Data is one of the most valuable assets an organization has, so it’s not surprising that criminals are constantly trying to steal it. Data exfiltration is on the rise;  2023 was a record setting year...

Brand protection technologies actively scan and identify questionable listings that misuse a brand, such as by offering fake products or perpetrating frauds. These tools produce analytics offering insights into how a brand might be at...

Understanding Digital Risk Protection Software Digital Risk Protection (DRP) consists of protecting digital assets and brand reputation from external threats. As organizations increase their external attack surfaces, they expand their threat and attack surfaces, increasing...

E

Your organization’s attack surface is constantly growing. As technology evolves, almost every company is undergoing digital transformations to stay competitive. However, the more applications, devices, and networks are connected, the more your external attack surface...

Organized crime, nation states, individual cybercriminals: all organizations face a range of external threats to their data and systems. Growing external attack surfaces also mean that those external threats can more easily find their way...

F

There are no glossary articles for this letter.

G

If your company is developing applications or software of any kind, your developers are probably using GitHub. If you are, you’re in good company: as of 2023 more than 90% of Fortune 100 companies are...

H

There are no glossary articles for this letter.

I

There are no glossary articles for this letter.

J

There are no glossary articles for this letter.

K

There are no glossary articles for this letter.

L

There are no glossary articles for this letter.

M

There are no glossary articles for this letter.

N

There are no glossary articles for this letter.

O

There are no glossary articles for this letter.

P

Phishing detection consists of the tools and methods organizations use to identify and respond to phishing attacks in their early stages. Phishing detection is critical to protect sensitive data, reduce compliance risk, and maintain brand...

Q

There are no glossary articles for this letter.

R

Amongst the threat landscape, ransomware is an area that is especially becoming increasingly more complex.  Recent advancements in ransomware tactics have seen a shift from mere data encryption to more complex double and triple extortion...

Subscription-based applications have changed the software market  — including the illicit software market. Ransomware as a Service, or RaaS, means that threat actors don’t have to code their own ransomware; they can simply buy it...

Modern ransomware attacks no longer simply encrypt data. Over the past few years, attackers have been focusing on double and triple extortion attacks that also include stealing data and holding it hostage until the victim...

S

Source code, the programming code that makes up an application, is the foundation of all software. Because it’s so important, it’s a prime target for cybercriminals who want to find and exploit data vulnerabilities in...

T

Third-party threats are a growing concern for organizations in all industries. The greater digitization of companies’ infrastructure and collaboration between third-party partners/vendors/etc increasingly puts organizations at risk. However, security teams can manage third-party threats by...

Telegram monitoring is critical as cybercriminals shift their communications from dark web forums to illicit channels on the encrypted messaging service. To hide from law enforcement agencies that now have a deep and dark web...

Third-parties’ cybersecurity posture affects your organization, as third-party breaches affect organizations regardless of sector. In 2023, 41% of companies reported a third-party breach. As organizations further digitize their internal infrastructure and offerings, the external attack...

U

There are no glossary articles for this letter.

V

There are no glossary articles for this letter.

W

There are no glossary articles for this letter.

X

There are no glossary articles for this letter.

Y

There are no glossary articles for this letter.

Z

There are no glossary articles for this letter.