Archives: Glossary Terms

SOC

Security Operations Center.

Read More

Spear-Phishing

Phishing that is targeted at, and tailored to, a specific individual. Distinct from regular phishing which is broadcast and not tailored.

Read More

Threat Actor

An individual, group, organization, government, or government sponsored entity that conducts or has the intent to conduct malicious activities.

Read More

Timestamping

The act of modifying file timestamps. Usually in the context of malicious activity, to hide that a file is newly or recently modified.

Read More

TTP

Tactics, Techniques and Procedures

Read More

VM

Virtual Machine

Read More

Vulnerability

A flaw or misconfiguration in hardware or software. Threat Actors exploit vulnerabilities to perform attacks and/or gain unauthorized access.

Read More