Glossaire

Explore Flare Cybersecurity 101

A

Artificial intelligence (AI) in cybersecurity, or AI cybersecurity, strategically combines AI technologies with cybersecurity systems. This means using AI’s advanced algorithms and data processing capabilities to enhance an organization’s detection, prevention, and response to cyber...

Artificial Intelligence (AI)  in threat intelligence refers to the use of artificial intelligence technologies and techniques to improve the detection, analysis, and response to cyber threats. AI threat intelligence automates the process of collecting and...

B

Your brand is one of your organization’s most valuable assets. So why wouldn’t you protect your brand the way you’d protect any other business asset? By actively monitoring and protecting your brand, your organization can...

C

Continuous Threat Exposure Management (CTEM) represents an evolutionary step in cybersecurity, focusing on proactive threat identification and management. It continuously monitors and analyzes an organization’s digital assets to identify vulnerabilities, assess risks, and prioritize remediation...

Credential stuffing prevention keeps attackers from using stolen or leaked user IDs and passwords to gain unauthorized access to an organization’s systems, networks, and data. Typical ways to mitigate credential stuffing attack risk include requiring...

Cyber threats are constantly changing. Criminals are always coming up with new and more effective malware, coming up with new ways to infiltrate cyber defenses, and finding novel ways to socially engineer attacks. With an...

The cybersecurity threats of today are rapidly changing and not only much different from the threats of five years ago, but also even in two years ago. Threat actors are always changing their tactics along...

D

The dark web is the part of the internet that is not indexed by search engines, and one that you can’t access with a traditional browser. It’s also a hub for cybercriminal activity; threat actors...

Data breach can result in the loss of sensitive information, such as customer data, financial information, or intellectual property. This can lead to financial losses, reputational damage, and legal liability. However, data breaches can be...

Data is one of the most valuable assets an organization has, so it’s not surprising that criminals are constantly trying to steal it. Data exfiltration is on the rise;  2023 was a record setting year...

A Guide to Data Leakage Prevention Tools Data is your organization’s most important asset, so when it leaks, it’s critical to catch that leak quickly. It’s even more important to prevent leaks from happening in...

Your organization stores an incredible amount of data — code, credentials, proprietary information, customer data, information about your employees — it’s all sensitive data, and threat actors are interested in getting their hands on it....

The Internet is vast, and only the smallest fraction of it is indexed and visible to the general public; the rest of it (between 90 and 99 percent) is the deep web. Given that criminals...

Brand protection technologies actively scan and identify questionable listings that misuse a brand, such as by offering fake products or perpetrating frauds. These tools produce analytics offering insights into how a brand might be at...

The digital threat landscape has become increasingly complex and sophisticated over the past few years. Organizations’ sensitive information can get leaked or stolen, then taken advantage of by threat actors.  Incorporating a digital risk protection...

Understanding Digital Risk Protection Software Digital Risk Protection (DRP) consists of protecting digital assets and brand reputation from external threats. As organizations increase their external attack surfaces, they expand their threat and attack surfaces, increasing...

Domain monitoring tools collect data from various sources, including domain registrars and web logs, to monitor for potentially malicious domain registrations that threat actors use to steal data. By incorporating threat intelligence into domain monitoring...

E

Your organization’s attack surface is constantly growing. As technology evolves, almost every company is undergoing digital transformations to stay competitive. However, the more applications, devices, and networks are connected, the more your external attack surface...

Organized crime, nation states, individual cybercriminals: all organizations face a range of external threats to their data and systems. Growing external attack surfaces also mean that those external threats can more easily find their way...

F

There are no glossary articles for this letter.

G

If your company is developing applications or software of any kind, your developers are probably using GitHub. If you are, you’re in good company: as of 2023 more than 90% of Fortune 100 companies are...

H

There are no glossary articles for this letter.

I

Cybercrime is an economy, and as with every economy, there are brokers. Initial access brokers (IABs) are a key piece of the criminal market: they specialize in selling access to compromised systems to other criminals....

J

There are no glossary articles for this letter.

K

There are no glossary articles for this letter.

L

There are no glossary articles for this letter.

M

There are no glossary articles for this letter.

N

There are no glossary articles for this letter.

O

There are no glossary articles for this letter.

P

Phishing detection consists of the tools and methods organizations use to identify and respond to phishing attacks in their early stages. Phishing detection is critical to protect sensitive data, reduce compliance risk, and maintain brand...

Q

There are no glossary articles for this letter.

R

According to the Federal Bureau of Investigation’s (FBI) 2023 Internet Crime Complaint Center (IC3) report, the federal agency received 2,385 complaints identified as ransomware with adjusted losses of more than $34.3 million in 2022. Of...

Amongst the threat landscape, ransomware is an area that is especially becoming increasingly more complex.  Recent advancements in ransomware tactics have seen a shift from mere data encryption to more complex double and triple extortion...

Modern ransomware attacks no longer simply encrypt data. Over the past few years, attackers have been focusing on double and triple extortion attacks that also include stealing data and holding it hostage until the victim...

S

Most people are familiar with phishing – fraudulent emails meant to scam recipients – but threat actors don’t limit themselves to email. Smishing, the use of SMS and text messages to send fake messages, has...

Source code, the programming code that makes up an application, is the foundation of all software. Because it’s so important, it’s a prime target for cybercriminals who want to find and exploit data vulnerabilities in...

Threat actors are becoming more sophisticated in their cybercrime methods. Ransomware is projected to cost victims $42 USD in 2024. For reference, this is more than double the amount that ransomware cost in 2021, which...

T

Telegram monitoring is critical as cybercriminals shift their communications from dark web forums to illicit channels on the encrypted messaging service. To hide from law enforcement agencies that now have a deep and dark web...

Third-parties’ cybersecurity posture affects your organization, as third-party breaches affect organizations regardless of sector. In 2023, 41% of companies reported a third-party breach. As organizations further digitize their internal infrastructure and offerings, the external attack...

Third-party threats are a growing concern for organizations in all industries. The greater digitization of companies’ infrastructure and collaboration between third-party partners/vendors/etc increasingly puts organizations at risk. However, security teams can manage third-party threats by...

U

There are no glossary articles for this letter.

V

There are no glossary articles for this letter.

W

There are no glossary articles for this letter.

X

There are no glossary articles for this letter.

Y

There are no glossary articles for this letter.

Z

There are no glossary articles for this letter.