IT Knowledge Base

Explanation of terms and information
from the world of IT security

Our knowledge database provides you with valuable information on various topics in the field of IT security. Learn which dangers exist and how you can counter these threats to ward off CEO fraud, ransomware, phishing and more. In addition, you’ll find an overview of relevant information security terms.

Thumbnail : IT Knowledge Base
IT Knowledge Base

Account Takeover (ATO)

Account takeover (ATO) is when a hacker successfully takes ownership of one or multiple online accounts. This form of fraud is often carried out by the hacker using stolen login credentials to gain access.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Barrel Phishing

Also referred to as “double-barreled” phishing, barrel phishing is a more sophisticated form of phishing that involves two emails.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Brute force attacks

A brute-force attack is a trial-and-error method used to obtain information such as passwords or other access codes. Find out more.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Business Email Compromise

Business Email Compromise (BEC) is characterized according to its different forms. In addition to compromising an employee’s email account, methods such as spear phishing or CEO fraud are also used, the latter being preferred by criminals for gaining access to confidential company information or money.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

CEO Fraud

CEO fraud is when a hacker impersonates a senior executive within an organization and attempts to dupe employees into providing sensitive company information, sharing account credentials, or transferring funds.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Clone Phishing

Clone phishing is a subset of phishing that replicates a previously sent, legitimate email to exploit victims.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Computer Virus

What exactly is a computer virus? What are the chances of eliminating one? And what kind of protection is really effective against them?

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Computer Worm

A computer worm is a malicious program that reproduces itself as it spreads to as many computers as possible. This makes the it particularly dangerous for companies.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Credential harvesting

Credential harvesting is a specific type of cyberattack targeting login credentials, such as usernames and passwords.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Credential Stuffing

Credential stuffing is a form of cyberattack that involves using stolen login credentials to access other unrelated services and applications.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Crypto Mining

With the establishment of cryptocurrency, the era of a new means of payment has been ushered Crypto Mining in. To better understand the miners’ gold rush, we have summarized the most important facts.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Cryptography

Today, encryption is mainly thought of as an IT term, because data, e-mails, computers etc. are encrypted. But that was not always so. Encryption actually has its origins back in the year 480. And until a few years ago, encryption was primarily used in espionage or in top-secret government communications.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Cryptojacking

Cryptojacking is a type of cyberattack in which hackers infiltrate a user’s device and secretly use computing resources to mine cryptocurrencies.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Cryptolocker Ransomware

The Cryptolocker Ransomware is still known to many as an extremely perfidious attack method. Here you will learn everything you need to know.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Cyber Kill Chain

To identify and combat attacks along the Cyber Kill Chain in time, you need to understand the strategies of the criminals.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Cyberattack

A cyberattack is any attempt by nefarious individuals to target an organization’s IT infrastructure, networks, systems, or devices to either steal, expose, or destroy information or assets.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Cybersecurity

Cybersecurity is the collection of technologies, best practices, and processes used to protect your IT infrastructure, systems, networks, and devices from harmful threats.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Data exfiltration

Data exfiltration is the deliberate extraction of sensitive data by an external organisation without permission.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Data loss prevention (DLP)

Data Loss Prevention (DLP) is the process of protecting sensitive data from getting lost, destroyed, or exfiltrated through unwanted and unauthorized means.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Data privacy

Data privacy refers to the ability for online users to control their personal information, including to what extent it gets shared with third parties.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

DDoS Attack

The abbreviation DDoS stands for Distributed Denial Of Service. A DDoS attack is a type of DoS attack in which several hijacked systems are used to carry out an attack against the target system.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

DKIM (DomainKeys Identified Mail)

DomainKeys Identified Mail (DKIM) is an email verification process that validates with a digital signature that an email came from the intended organization.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

DNS spoofing

DNS spoofing, short for Domain Name System spoofing and also referred to as DNS cache poisoning, is a type of cyberattack in which domain name servers are compromised via fake data to redirect users to harmful websites.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Domain spoofing

Domain spoofing is a phishing attack where cybercriminals use a fake version of a legitimate email address to scam users.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Email Filtering

Email filtering refers to the process of analyzing incoming emails and applying specific rules to determine their legitimacy and potential risk.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Email gateway

An email gateway, or secure email gateway (SEG), is a solution designed to enhance the security of email communication.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Email scams

Email scams are malicious attempts by hackers to trick unsuspecting users into taking a compromising action.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Email Spoofing

Email spoofing is a technique used in phishing and spear phishing attempts in which a person attempts to pass off a fraudulent email as a legitimate one that closely resembles a message an individual would typically receive.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Emotet

What is Emotet? And how can I protect myself from Emotet? Measures to protect against the most dangerous malware Emotet.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Encryption

Encryption is the process of transforming information to make it unreadable for anyone except those who have the proper encryption key.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Endpoint Detection and Response (EDR)

EDR systems detect security threats by monitoring endpoint activity for suspicious behaviors, block and contain malicious threats, and facilitate incident response and investigation activities.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Endpoint Security

Endpoint security is a type of cybersecurity that protects devices such as phones, computers, and tablets from harmful threats and activities.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

GoBD

What is GoBD? And what does GoBD mean for companies? The GoBDs are the principles for the proper management and storage of books.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

IT Security

Whenever an organization communicates online and stores and transfers data and information, it must ensure its IT security. But what exactly is this?

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Malware

The term malware is used to describe all kinds of malicious software. The focus here is on malware that is loaded onto the device in order to cause damage.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Phishing

Phishing is an electronically executed fraud attempt in which the recipient is sent a fake e-mail that he often does not recognize as such at first…

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Ransomware

How exactly does ransomware work? How big is the danger of ransomware? How you can protect yourself against ransomware? We will explain in this article!

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Ransomware Kill Chain part 1

The Ransomware kill chain. Here we would like to show you the anatomy of a Ransomware attack along the Cyber Kill Chain. Find out more now.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Ransomware Kill Chain Part 2

Ransomware Kill Chain Part 2: How to use the Ransomware Kill Chain model to derive appropriate countermeasures. Learn more from Hornetsecurity.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Social engineering

How hackers collect data from companies via social engineering, without hacking and how to protect against it.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Spear Phishing

Spear phishing is a cyber attack with extremely malicious intent that is derived from traditional phishing. In a conventional phishing attack, the target persons fall randomly into the attacker’s grid.

Read more

Thumbnail : IT Knowledge Base
IT Knowledge Base

Trojans

Insidiously, as in the famous mythology, a Trojan horse attacks computers, steals data and damages the system.

Read more