Everything you need to know to understand CyberLite Issue 6. Read the issue here.
Zero-Day: Refers to vulnerabilities that are unknown to the parties responsible for patching or fixing them.
Credential Stuffing Attack: When a cybercriminal uses stolen account credentials to try and access user accounts online via large-scale, automated login requests. It’s a brute force technique where attackers try as many combinations of stolen credentials as they can, aiming to get unauthorized access to user accounts.
Vulnerability: A weakness a malicious actor could take advantage of to compromise a resource.
Exploit: Code malicious actors use to take advantage of a certain vulnerability.
Ransomware: Ransomware blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.