APT – Advanced Persistent Threat

What is an APT (Advanced Persistent Threat): An Advanced Persistent Threat (APT) is a long-term, sophisticated and targeted cyberattack in which an attacker gains undetected access to a network and remains there for an extended period of time in order to steal data, manipulate it or cause damage. This type of attack is characterized by […]

APT Scanner – Advanced Persistent Threat Scanner

What is an APT scanner? An APT scanner in the context of cyber security is a tool or system designed to detect and analyze advanced persistent threats (APTs). These scanners are designed to identify advanced, persistent and targeted cyber threats. An APT scanner can operate at different levels of a network and analyze different types […]

Bootkit

What is a boot kit and how does it work? A bootkit is a type of malware that attacks at the deepest system level: the bootloader. The bootloader is a critical component that loads the operating system when a computer starts up. Bootkits manipulate this process to hide from antivirus software and operating system integrity […]

Cryptojacking

What is cryptojacking? Cryptojacking is a form of cyberattack in which criminals use the computing power of a device – for example a computer, smartphone or server – to mine cryptocurrencies without being noticed. The term is made up of “cryptocurrency” and “hijacking”. The aim of the attackers is to hijack computing resources in order […]

DDoS – Distributed Denial of Service

What is a Distributed Denial of Service (DDoS) attack? A Distributed Denial of Service (DDoS) attack is a coordinated attack in which a large number of requests or data streams are sent to a system, network or service in order to overload it and make it inaccessible to legitimate users. This is done by deliberately […]

Indicators of Compromise (IoC)

What are Indicators of Compromise (IoC) in cyber security? Indicators of Compromise (IoCs) are digital artifacts or evidence that indicate a potential security breach. These indicators can help to detect and analyze cyberattacks at an early stage. Typical IoCs include suspicious IP addresses, manipulated files and unusual network traffic. By detecting such anomalies, companies can […]

Insider threat

What is an insider threat? An insider threat occurs when a person within an organization – such as an employee, contractor or partner – abuses their legitimate access rights to intentionally or unintentionally cause harm. This threat can result from both malicious intent (sabotage, data theft) and negligence (breaches of security policies, unintentional disclosure of […]

MITM – man-in-the-middle attack

What is a man-in-the-middle attack (MITM)? A man-in-the-middle attack (MITM) is a form of cyberattack in which an attacker intercepts, modifies or forwards communication between two or more parties without being noticed. The attacker positions himself “in the middle” of the communication, giving him the opportunity to steal confidential information or manipulate the data traffic. […]

Ransomware

What is ransomware? Ransomware is a form of malware (malicious software) that aims to lock a system or encrypt files so that the legitimate user can no longer access them. The attacker then demands a ransom to restore access. This can be demanded in the form of cryptocurrencies such as Bitcoin to maintain anonymity. There […]

Rootkit

What is a rootkit? A rootkit is a type of malware designed to give an attacker undetected access to a computer system and maintain it. Unlike other forms of malware, a rootkit is not primarily designed to cause direct damage or data loss, but to conceal itself and other malicious activities. By manipulating operating system […]

Cookie Consent with Real Cookie Banner