IoT
Internet of Things
AI
Artificial Intelligence
Ransomware payload
The code encrypting the files and requiring ransom in exchange
Zero day vulnerability
A vulnerability in software that is previously unknown to the vendor, and therefore no patch or fix for it is available yet.
A zero-day exploit
Malicious code making use of a zero day vulnerability
PCI-DSS
Payment Card Industry Data Security Standard,
a standard governing the cybersecurity of the card payment solutions globally
MFA
Multi-Factor Authentication – a method of authentication requiring at least two “factors” to authenticate. In most common enterprise deployment, password is the first factor, complemented by an Authenticator application
as the second factor.
DoS, DDoS
Attack that floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfill legitimate requests. Modern attacks are typically distributed (DDoS), meaning it originates from a large amount of computers, e.g. a Botnet.
Botnet
A collection of hijacked computers remotely controlled by a cybercriminal to perform tasks such as email spamming or DDoS attacks