Glossary

Explore Flare Cybersecurity 101

A

Not all threat data is created equal. Some data is relevant and will help your team prevent or mitigate an attack. Other threat intelligence may not apply to your organization, and just adds to the...

Artificial intelligence (AI) in cybersecurity, or AI cybersecurity, strategically combines AI technologies with cybersecurity systems. This means using AI’s advanced algorithms and data processing capabilities to enhance an organization’s detection, prevention, and response to cyber...

Artificial Intelligence (AI)  in threat intelligence refers to the use of artificial intelligence technologies and techniques to improve the detection, analysis, and response to cyber threats. AI threat intelligence automates the process of collecting and...

In today’s fast-moving world of cyber threats, security teams need to be agile, dynamic, and always ready for a bad actor’s next move. Threat intelligence can help by allowing analysts to see what’s coming and...

B

Your brand is one of your organization’s most valuable assets. So why wouldn’t you protect your brand the way you’d protect any other business asset? By actively monitoring and protecting your brand, your organization can...

C

At last count, there were more than 24 billion stolen credentials circulating on the dark web. Considering that stolen passwords and usernames are big business among criminals, it’s not enough to simply teach good password...

Continuous Threat Exposure Management (CTEM) represents an evolutionary step in cybersecurity, focusing on proactive threat identification and management. It continuously monitors and analyzes an organization’s digital assets to identify vulnerabilities, assess risks, and prioritize remediation...

Who stole the cookie from the cookie jar? A threat actor, probably using infostealer malware. While cookie hijacking may sound whimsical, the impact of cookie theft can be devastating. Cookies offer bad actors a way...

Credential stuffing prevention keeps attackers from using stolen or leaked user IDs and passwords to gain unauthorized access to an organization’s systems, networks, and data. Typical ways to mitigate credential stuffing attack risk include requiring...

Credentials are the keys to your networks, your systems, and all your most valuable information. It’s no wonder that they’re such a popular target for cybercriminals — why do the work of breaking into your...

Threat actors are no stranger to cyber reconnaissance. Reconnaissance is often the first step of a cyber attack, as threat actors prod your infrastructure for weaknesses and potential attack vectors. For this reason, it’s critical...

Cyber threats are constantly changing. Criminals are always coming up with new and more effective malware, coming up with new ways to infiltrate cyber defenses, and finding novel ways to socially engineer attacks. With an...

The cybersecurity threats of today are rapidly changing and not only much different from the threats of five years ago, but also even in two years ago. Threat actors are always changing their tactics along...

D

Dark web scraping enables security teams to proactively identify and mitigate cyber risks by extracting valuable information from illicit threat actor communities and cybercriminal forums. By automating the process, organizations improve their security posture so...

The dark web is the part of the internet that is not indexed by search engines, and one that you can’t access with a traditional browser. It’s also a hub for cybercriminal activity; threat actors...

Data breach can result in the loss of sensitive information, such as customer data, financial information, or intellectual property. This can lead to financial losses, reputational damage, and legal liability. However, data breaches can be...

Data is one of the most valuable assets an organization has, so it’s not surprising that criminals are constantly trying to steal it. Data exfiltration is on the rise;  2023 was a record setting year...

Has your data been leaked? If so you might not know. Attackers (understandably) don’t want to get caught in the act of stealing your data, so they tend not to advertise it until they’ve used...

Data is your organization’s most important asset, so when it leaks, it’s critical to catch that leak quickly. It’s even more important to prevent leaks from happening in the first place. Data leakage prevention tools...

Your organization stores an incredible amount of data — code, credentials, proprietary information, customer data, information about your employees — it’s all sensitive data, and threat actors are interested in getting their hands on it....

The Internet is vast, and only the smallest fraction of it is indexed and visible to the general public; the rest of it (between 90 and 99 percent) is the deep web. Given that criminals...

Between 90% and 99% is unindexed and invisible to the general public — that’s the deep web. Being able to automatically monitor the deep web is an important capability for your security team. Deep web...

Brand protection technologies actively scan and identify questionable listings that misuse a brand, such as by offering fake products or perpetrating frauds. These tools produce analytics offering insights into how a brand might be at...

E

Your enterprise growing can be a double-edged sword: as your organization scales, adding more employees, third parties, customers, and locations, your attack surface expands as well. This creates more vectors for attackers to exploit, and...

Over the last few years, Extended Detection and Response (XDR) has changed the cybersecurity world. By consolidating many security tools into a single platform, XDR has picked up where Endpoint Detection and Response (EDR) left...

Your organization’s attack surface is constantly growing. As technology evolves, almost every company is undergoing digital transformations to stay competitive. However, the more applications, devices, and networks are connected, the more your external attack surface...

Organized crime, nation states, individual cybercriminals: all organizations face a range of external threats to their data and systems. Growing external attack surfaces also mean that those external threats can more easily find their way...

F

There are no glossary articles for this letter.

G

Artificial intelligence (AI) has always been a part of cybersecurity, but recently the advent of generative AI has changed the industry — both for better and for worse. Threat actors have developed their own uses...

If your company is developing applications or software of any kind, your developers are probably using GitHub. If you are, you’re in good company: as of 2023 more than 90% of Fortune 100 companies are...

There are no borders when it comes to cybersecurity; an attacker can be anywhere in the world, and increasingly, attacks and geopolitics are linked. For example, Russian state-backed cyber criminals have been behind major attacks...

H

There are no glossary articles for this letter.

I

Gartner defines identity intelligence as the process of gathering and converting information about users’ identity and access so that organizations can gain action-oriented insights and make informed IT and business decisions. As attackers increasingly target...

Attackers increasingly use stolen credentials and credential based attacks to gain unauthorized access to systems, networks, devices, and data. Identity Threat Detection and Response (ITDR) focuses on detecting unauthorized identities and user access to mitigate...

Cybercrime is an economy, and as with every economy, there are brokers. Initial access brokers (IABs) are a key piece of the criminal market: they specialize in selling access to compromised systems to other criminals....

J

There are no glossary articles for this letter.

K

There are no glossary articles for this letter.

L

Leaked credentials monitoring helps organizations identify user IDs and passwords involved in data breaches so that they can attempt to uplevel security on those accounts. In today’s largely cloud-based corporate environments, attackers use leaked credentials...

M

The Security Operations Center (SOC) has evolved significantly over the past decade. Increasingly complicated cybersecurity threats, advancing technology and the increasing need for integrated, real-time security solutions has made the role of the SOC much...

N

There are no glossary articles for this letter.

O

There are no glossary articles for this letter.

P

If your organization has invested in penetration testing, you likely have at least one pen test report on file. Despite the vast amount of important information in a pen test report, however, many such documents...

Pen tests are a critical part of cyber security, and to be successful, a pen tester needs quality threat intelligence and a way to identify threat exposures quickly. Threat intelligence is an important pen test...

Phishing detection consists of the tools and methods organizations use to identify and respond to phishing attacks in their early stages. Phishing detection is critical to protect sensitive data, reduce compliance risk, and maintain brand...

Traditionally, security has been the reaction to a threat or an attack. A cyber criminal launches an attack on your organization, your team responds, the attack is stopped and the damage is mitigated. But what...

Q

There are no glossary articles for this letter.

R

According to the Federal Bureau of Investigation’s (FBI) 2023 Internet Crime Complaint Center (IC3) report, the federal agency received 2,385 complaints identified as ransomware with adjusted losses of more than $34.3 million in 2022. Of...

Amongst the threat landscape, ransomware is an area that is especially becoming increasingly more complex.  Recent advancements in ransomware tactics have seen a shift from mere data encryption to more complex double and triple extortion...

Modern ransomware attacks no longer simply encrypt data. Over the past few years, attackers have been focusing on double and triple extortion attacks that also include stealing data and holding it hostage until the victim...

Your organization has made a significant investment in cybersecurity controls, and it’s important to know if those controls are working. Red team testing puts your defenses to the test with mock attacks, either from ethical...

Red team tools help offensive security teams assess, test, and exploit vulnerabilities across the organization’s infrastructure, applications, people, and processes. Threat exposure management supplements these tools with real-time insights into adversary activities for more robust...

S

Security teams have a tough job; they have to stay on top of constantly-changing cyber threats, keep your organization’s data safe, secure an expanding attack surface, and respond to attacks and breaches. Often, they’re doing...

Imagine walking into your workplace. You have a badge that you swipe to unlock the door, and as you’re entering, someone behind you calls to you, asking to hold the door for them. You don’t...

Your cyber security controls can seem like a patchwork of solutions. While they all work to keep your data safe, they may not communicate with one another, which means your security team is manually sifting...

Most people are familiar with phishing – fraudulent emails meant to scam recipients – but threat actors don’t limit themselves to email. Smishing, the use of SMS and text messages to send fake messages, has...

When it comes to your software supply chain, you are only as strong as your weakest link. You need your supply chain. However, that interconnectedness makes your digital supply chain a prime target for cybercriminals....

Source code, the programming code that makes up an application, is the foundation of all software. Because it’s so important, it’s a prime target for cybercriminals who want to find and exploit data vulnerabilities in...

The explosive growth of infostealer malware has been a major trend of the past four years. What even is an infostealer? Once they infect computers, they can steal information stored in the browser such as...

Threat actors are becoming more sophisticated in their cybercrime methods. Ransomware is projected to cost victims $42 USD in 2024. For reference, this is more than double the amount that ransomware cost in 2021, which...

Your suppliers are a necessary part of your organization’s business. Because they provide crucial services — like billing and data storage —they become an indispensable part of your extended enterprise. Unfortunately, this also makes suppliers a...

It isn’t easy to ensure that your suppliers are keeping your data safe. You can use questionnaires. You can require SOC 2 compliance. Neither, however, will let you know if your supply chain is being...

T

Telegram monitoring is critical as cybercriminals shift their communications from dark web forums to illicit channels on the encrypted messaging service. To hide from law enforcement agencies that now have a deep and dark web...

Third-parties’ cybersecurity posture affects your organization, as third-party breaches affect organizations regardless of sector. In 2023, 41% of companies reported a third-party breach. As organizations further digitize their internal infrastructure and offerings, the external attack...

Third-party threats are a growing concern for organizations in all industries. The greater digitization of companies’ infrastructure and collaboration between third-party partners/vendors/etc increasingly puts organizations at risk. However, security teams can manage third-party threats by...

Threat Intelligence as a Service (TIaaS) uses a subscription-based model so organizations can access information about potential threats and vulnerabilities. By automating the research, security analysts can save time, reduce the impact of the cybersecurity...

Security teams need to be agile, dynamic, and able to prepare for any foreseeable attack. Threat intelligence data is a tool that allows them to do just that. When analysts have access to strong and...

Just like old-time criminals robbing a bank vault, threat actors tend to go where the money is — financial services companies. Instead of a vault, however, they’re trying to breach your cyberdefenses. And instead of...

Cyber attacks on government agencies are on the upswing. According to the FBI, government agencies are the third most-targeted sector by ransomware attacks. Other data finds that cyber attacks against state and public agencies are...

The healthcare industry faces unique cybersecurity challenges as they are the custodians of their clients’ most personal private data. They are bound by strict data privacy regulations and thus are also increasingly targeted by cybercriminals...

Cyber risk never stands still — in the face of a threat, businesses need to make fast, accurate decisions about their cybersecurity controls and posture. Managed Detection and Response (MDR) providers know this. To serve...

The Security Operations Center (SOC) has undergone a significant change in recent years. What began as an actual physical place in some enterprises — a room where security guards monitored video feeds and access control —...

U

There are no glossary articles for this letter.

V

There are no glossary articles for this letter.

W

There are no glossary articles for this letter.

X

There are no glossary articles for this letter.

Y

There are no glossary articles for this letter.

Z

There are no glossary articles for this letter.