Archives: Glossary Terms

Open source

Software whose source code is made available through an open-source license in which the copyright holder grants the right to study, change, and distribute the software for free.

Read More

OS INT

Open Source intelligence in this context refers to publicly available threat intelligence (as opposed to threat intelligence that you pay for).

Read More

Phishing

A fraudulent attempt to get someone to take an action by pretending to be trustworthy via electronic message, most commonly email or SMS. See also Spear Phishing.

Read More

Powershell

A scripting language built into Microsoft Windows that allows for the automation of system administration tasks.

Read More

PUA

Potentially Unwanted Application.

Read More

SecOPS

Security Operations.

Read More

SIEM

Security information and event manager / management.

Read More

SOC

Security Operations Center.

Read More

Spear-Phishing

Phishing that is targeted at, and tailored to, a specific individual. Distinct from regular phishing which is broadcast and not tailored.

Read More

Threat Actor

An individual, group, organization, government, or government sponsored entity that conducts or has the intent to conduct malicious activities.

Read More