From CISO Marketplace — the hub for security professionals Visit

Threat Intelligence Terms

148 terms

Advanced Threat Modeling

A proactive process of identifying, quantifying, and addressing potential cyber threats against systems.

Adversary Emulation Plans

Detailed blueprints that replicate known attacker behaviors to assess and improve cybersecurity readiness.

Adversary Simulation Software

Programs that replicate attacker behavior to test and improve an organization's defensive capabilities.

AI Model Security Framework

Protection mechanisms for artificial intelligence systems.

AI-Driven Anomaly Detection

Utilizing artificial intelligence to identify irregular system behaviors that may signal a cyber threat.

AI-Powered Cyber Risk Forecasting

Leveraging artificial intelligence to predict and prepare for emerging cybersecurity risks.

Algorithmic Threat Detection

Utilizing sophisticated algorithms to scan large data sets for patterns indicative of cyber attacks.

ALPHV/BlackCat Ransomware

A sophisticated ransomware-as-a-service group known for pioneering triple extortion tactics, being the first major group…

Attack Chain Analysis

The process of analyzing the sequence of events that occur during a cyber attack.

Attack Chain Analysis Platform

Tools for studying how attacks progress through systems.

Attack Chain Interruption

Techniques for breaking the sequence of events in a cyber attack.

Attack Chain Mapping

The process of documenting and analyzing the steps taken during a cyber attack.

Attack Chain Visualization

Creating visual representations of attack sequences.

Attack Cost Analysis

The process of evaluating the financial impact of cyber attacks.

Attack Graph Generation

The creation of visual representations of potential attack paths through a system.

Attack Path Modeling

The process of identifying and analyzing potential routes attackers could take through a network.

Attack Path Validation

Testing whether theoretical attack paths are actually exploitable.

Attack Pattern Analysis

The study of common attack methodologies to improve defense strategies.

Attack Pattern Library

A collection of documented cyber attack methodologies.

Attack Pattern Recognition

Identifying common patterns in cyber attacks.

Attack Resistance Analysis

Evaluating how well systems can withstand various types of attacks.

Attack Sequence Diagram

Visual representation of attack progression.

Attack Sequence Modeling

Creating detailed models of how attacks progress through systems.

Attack Signature

Unique pattern identifying specific exploit methods or malware families through behavioral analysis.

Attack Simulation Platform

Tools that enable organizations to test their security by simulating real attacks.

Attack Simulation Platforms

Tools that replicate real-world cyber attack scenarios to test and refine defensive measures.

Attack Surface

All potential entry points vulnerable to cyber threats in a system.

Attack Surface Analysis Tools

Software used to identify and assess potential vulnerabilities.

Attack Surface Assessment Framework

Structured approach to evaluating vulnerabilities.

Attack Surface Baseline

Standard reference point for vulnerability assessment.

Attack Surface Discovery

The continuous process of identifying new potential entry points for attacks.

Attack Surface Enumeration

Systematically identifying all possible attack vectors.

Attack Surface Management

The continuous discovery, inventory, classification, and monitoring of an organization's IT infrastructure.

Attack Surface Management Platform

Tools for discovering and managing potential vulnerabilities.

Attack Surface Mapping Tools

Software for identifying and visualizing potential vulnerabilities.

Attack Surface Monitoring

Continuous observation of potential vulnerability points.

Attack Surface Reduction

The practice of minimizing the number of potential entry points for cyber attacks.

Attack Surface Reduction Strategy

Planned approach to minimizing potential entry points for attacks.

Attack Surface Visualization

Tools that create visual representations of an organization's potential vulnerabilities.

Attack Surface Visualization

Graphical mapping of an organization's potential entry points for cyber attacks to aid in risk management.

Attack Surface Visualization Platform

Tools for displaying potential vulnerabilities.

Attack Surface Weather Map

Real-time visualization of threat activity across attack surfaces.

Attack Tree

A visual diagram mapping potential attack vectors against a system, used to assess security risks and mitigation strateg…

Attack Vector Analysis

The process of identifying and analyzing potential methods of attack.

Attack Vector Identification

The process of discovering potential paths for cyber attacks.

Attack Vector Prioritization

Ranking potential attack methods by their likelihood and potential impact to guide remediation efforts.

Augmented Threat Intelligence

Enhancing traditional threat intelligence with additional contextual data for deeper analysis.

Automated Cyber Risk Scoring

The use of algorithms to continuously assign risk scores to assets based on current threat intelligence.

Automated Vulnerability Triage

Prioritizing security vulnerabilities.

Behavioral Analytics for Threat Hunting

The analysis of user and system behavior patterns to proactively detect potential cybersecurity breaches.

Behavioral Risk Scoring

Assigning risk ratings based on observed user and system behavior patterns to inform security decisions.

Behavioral Threat Intelligence

Leveraging behavioral data to detect emerging threats and predict attacker actions.

Blockchain Security Assessment

Evaluation of blockchain protections.

Breach and Attack Simulation

Tools that enable organizations to simulate cyber attacks against their systems to test their security.

Brute Force Attack

Method guessing credentials through trial-and-error attempts.

BYOVD (Bring Your Own Vulnerable Driver)

An attack technique where threat actors load a legitimate but vulnerable kernel-mode driver into a target system to expl…

Cl0p Ransomware Group

A Russian-linked cybercriminal group best known for conducting mass exploitation campaigns against enterprise file trans…

Cognitive Security Analysis

Security assessment using AI-driven analysis.

Cognitive Security Analytics

The application of cognitive computing methods to improve the analysis and interpretation of security data.

Collaborative Threat Intelligence Platforms

Systems that enable organizations to share and analyze threat data collectively.

Common Vulnerability Scoring System (CVSS)

Standardized system for rating IT vulnerabilities' severity and prioritization.

Contextual Risk Analytics

Analyzing risk by considering the broader operational and threat context in which an organization operates.

Cross-Domain Threat Correlation

The process of linking threat data from different IT domains to gain a holistic view of potential risks.

Cross-Platform Threat Intelligence

Aggregating and correlating threat data from multiple operating systems and environments.

Cyber Attribution Analysis

Techniques to determine the origin and identity of threat actors responsible for cyber attacks.

Cyber Deception Tactics

Techniques that use false data and decoys to mislead attackers and reveal their methods.

Cyber Espionage Countermeasures

Strategies designed to detect, prevent, and respond to intelligence-gathering cyber intrusions.

Cyber Threat Attribution

The process of tracking, identifying and laying blame on the perpetrator of a cyberattack.

Cyber Threat Ecosystem Mapping

Visualizing the relationships among various threat actors, vulnerabilities, and incidents within a digital ecosystem.

Cyber Threat Feed Aggregation

The consolidation of threat intelligence data from various sources to provide a comprehensive security view.

Cyber Threat Hunting

The practice of proactively searching for cyber threats that are lurking undetected in a network.

Dark Web Monitoring Tools

Software that scans hidden parts of the internet for compromised data and emerging threats.

Darknet Infrastructure Analysis

The study and mapping of hidden network structures used by cybercriminals to coordinate attacks.

DDoS Attack

Overwhelming target systems with excessive traffic to disrupt service availability.

Decentralized Threat Hunting

Distributing the responsibility for threat hunting across multiple teams or systems to improve coverage.

Deception Technology Integration

Incorporating decoy systems and misleading data into networks to confuse and detect attackers.

Deception-Based Threat Intelligence

Using deceptive strategies to misdirect attackers and gather intelligence about their methods.

Decoy Asset Management

The careful planning and maintenance of fake digital assets intended to distract or detect intruders.

Digital Footprint Analysis

Assessing an organization's online presence to identify potential exposures and vulnerabilities.

Dynamic Deception Technology

Systems that deploy decoy assets and misinformation in real time to mislead and trap attackers.

Exploit Kit

Pre-packaged tools automating vulnerability exploitation, often distributed via malicious ads or compromised sites.

Graph-Based Cyber Threat Intelligence

The use of graph theory to map relationships between threat actors, events, and attack vectors for improved analysis.

Honeynet Deployment

The strategic implementation of interconnected honeypots to attract and analyze malicious cyber activities.

Hybrid Threat Intelligence Platforms

Systems that combine multiple sources and types of threat intelligence to deliver a comprehensive security overview.

Initial Access Broker (IAB)

Cybercriminal specialists who focus exclusively on gaining unauthorized access to organizational networks and then selli…

Insider Risk Management Solutions

Tools and strategies aimed at detecting and mitigating threats originating from within an organization.

Insider Threat

Security risks from employees/contractors mishandling data.

Insider Threat Behavioral Analytics

Techniques that monitor and analyze internal user behavior to identify potential malicious activities.

Insider Threat Profiling

Techniques for identifying and monitoring internal users whose behavior deviates from the norm.

Integrated Cyber Defense Platforms

Comprehensive systems that unify multiple security functions into a single management console.

Living off the Land (LotL)

An attack technique where adversaries use legitimate, pre-installed operating system tools, utilities, and features — ra…

Living-off-the-Land Attacks

Cyber attacks that use legitimate, built-in system tools to carry out malicious activities.

LockBit Ransomware

The world's most prolific ransomware-as-a-service (RaaS) operation from 2021 through 2024, responsible for thousands of …

Machine Learning Attack Surface

Vulnerabilities specific to ML systems.

Machine Reasoning for Cyber Defense

Utilizing logical inference systems to enhance automated threat detection and response.

Neural Network Vulnerability

Weaknesses in AI neural networks.

Penetration Testing Frameworks

Structured methodologies and toolkits for simulating attacks to evaluate system security.

Predictive Threat Analytics

Leveraging data analytics to forecast potential cyber threats before they materialize.

Privacy Risk Quantification

Measurement of privacy risk levels.

RansomHub

A rapidly growing ransomware-as-a-service operation that emerged in February 2024 and quickly became the most active ran…

Real-Time Anomaly Detection Algorithms

Advanced algorithms designed to identify deviations from normal behavior as they occur.

Real-Time Threat Intelligence Correlation

Methods for linking disparate threat data in real time to provide actionable security insights.

Red Team Simulation Tools

Software solutions that mimic adversary tactics to test and improve an organization's defensive measures.

Salt Typhoon

A Chinese state-sponsored advanced persistent threat (APT) group that conducted widespread intrusions into major US tele…

Silk Typhoon

A Chinese state-sponsored APT group (formerly tracked as Hafnium) responsible for the late 2024 compromise of the US Tre…

Smart Contract Monitoring

Surveillance of blockchain contract execution.

Smart Contract Testing Framework

Structure for contract validation.

Smart Contract Vulnerability Scanner

Tool for finding contract weaknesses.

Social Engineering Simulation

Exercises designed to mimic social engineering attacks, testing an organization's resilience against human-targeted thre…

Strategic Cyber Intelligence

The long-term collection and analysis of threat data to inform an organization's cybersecurity strategy.

Supply Chain Attack

A cyber attack that targets an organization by compromising less-secure elements in their supply network.

Supply Chain Compromise Attacks

Third-party vendor breaches enabling simultaneous infiltration of multiple downstream organizations.

Threat Actor Attribution Framework

System for identifying attack sources.

Threat Actor Behavior Analytics

Analyzing attacker patterns.

Threat Actor Campaign Analysis

Studying specific attack campaigns.

Threat Actor Campaign Tracking

Monitoring specific adversary activities.

Threat Actor Capability Assessment

Evaluating attacker abilities.

Threat Actor Infrastructure

Technical resources used by attackers.

Threat Actor Profiling

Analyzing patterns and behaviors of cyber attackers.

Threat Actor Profiling

The process of analyzing attacker behaviors and tactics to create detailed profiles for threat identification.

Threat Actor Tracking System

Monitoring specific adversaries.

Threat Data Enrichment

The process of augmenting raw threat data with additional contextual information for better decision making.

Threat Emulation Platforms

Tools that simulate realistic attack scenarios to test the resilience of cybersecurity defenses.

Threat Hunting Methodologies

Proactive strategies and techniques used to search for hidden adversaries within networks.

Threat Hunting Playbook

Documented procedures for proactive threat detection.

Threat Intelligence Analysis Framework

Structure for analyzing threat data.

Threat Intelligence Feed Management

Handling multiple threat data sources.

Threat Intelligence Platform

A technology that collects, correlates, and analyzes threat data from multiple sources.

Threat Intelligence Platform Architecture

Structure of threat data systems.

Threat Intelligence Platform Integration

Connecting threat data sources.

Threat Intelligence Quality Metrics

Measuring threat data reliability.

Threat Intelligence Scoring

Evaluating the reliability of threat information.

Threat Intelligence Sharing Platform

System for exchanging threat data.

Threat Intelligence Sharing Protocols

Standardized methods that facilitate the secure exchange of threat information among organizations.

Threat Landscape Visualization

Creating visual representations of cyber threat data to improve situational awareness and strategic planning.

Threat Modeling Automation

Tools and processes that automate the identification and analysis of potential security threats.

Threat Propagation Modeling

Predictive analysis to understand how cyber threats might spread across interconnected systems.

Threat Vector Analysis

Evaluating the various pathways that attackers might exploit to infiltrate systems.

Trustworthy AI in Cybersecurity

Implementing artificial intelligence systems that are transparent, reliable, and secure for cyber defense.

Virtual Reality Attack Surface

VR-specific security vulnerabilities.

Volt Typhoon

A Chinese state-sponsored APT group focused on pre-positioning within US critical infrastructure — including power grids…

Vulnerability

Security weakness exploitable by threats.

Vulnerability Assessment

Systematic identification/analysis of security weaknesses in systems.

Web3 Risk Assessment

Evaluation of blockchain-related risks.

Web3 Security Monitoring

Blockchain security surveillance.

Web3 Vulnerability Database

Collection of blockchain vulnerabilities.

Zero-Day Exploit

A cyber attack that occurs on the same day a weakness is discovered in software.

Zero-Day Exploit

Attack targeting undisclosed software vulnerabilities before patches exist.