CyberLite Issue 6 Explainer

Explainers Feb 23, 2021

Everything you need to know to understand CyberLite Issue 6. Read the issue here.

Zero-Day: Refers to vulnerabilities that are unknown to the parties responsible for patching or fixing them.

Credential Stuffing Attack: When a cybercriminal uses stolen account credentials to try and access user accounts online via large-scale, automated login requests. It’s a brute force technique where attackers try as many combinations of stolen credentials as they can, aiming to get unauthorized access to user accounts.

Vulnerability: A weakness a malicious actor could take advantage of to compromise a resource.

Exploit: Code malicious actors use to take advantage of a certain vulnerability.

Ransomware: Ransomware blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.

Oliver Kitchin

Cybersecurity consultant. Passionate about people, technology and the great outdoors. He/Him.

Great! You've successfully subscribed.
Great! Next, complete checkout for full access.
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.