SOC
Security Operations Center.
Phishing that is targeted at, and tailored to, a specific individual. Distinct from regular phishing which is broadcast and not tailored.
An individual, group, organization, government, or government sponsored entity that conducts or has the intent to conduct malicious activities.
The act of modifying file timestamps. Usually in the context of malicious activity, to hide that a file is newly or recently modified.
A flaw or misconfiguration in hardware or software. Threat Actors exploit vulnerabilities to perform attacks and/or gain unauthorized access.