Cyber Threats

Start Your 30-Day trial today!

What is a whaling attack in cybersecurity, and how does it differ from phishing? A whaling attack is a specialized form of phishing that targets high-ranking individuals within an organization,...

What is the “ping of death” attack and how does it work? The “ping of death” is a type of Denial of Service (DoS) attack that exploits a vulnerability in...

What is session hijacking and how does it work? Session hijacking is a type of cyberattack where an attacker takes over a user’s active session on a network, often to...

What is packet sniffing, and how does it work? Packet sniffing is a method of capturing, analyzing, and interpreting network traffic. This involves intercepting data packets—the small units of data...

What is IP spoofing? IP spoofing is a technique used in cyberattacks where an attacker manipulates the source IP address of a data packet to make it appear as though...

What is an advanced persistent threat? An Advanced Persistent Threat (APT) is a sophisticated and targeted cyberattack where an attacker gains unauthorized access to a network and remains undetected for...

What is fraud as a service? Fraud-as-a-Service (FaaS) is a term used to describe a growing trend in the cybercrime ecosystem where fraudsters offer tools, services, and expertise to other...

What is a malware infection? A malware infection occurs when malicious software, known as malware, infiltrates a device or system without the user’s consent. Malware is designed to harm, exploit,...

What is cognitive hacking? Cognitive hacking is a form of cyberattack that exploits psychological manipulation to influence human decision-making, opinions, or behavior. Unlike traditional hacking that targets technical systems, cognitive...

Control Access. Control Risk.

Protect your critical IT assets with Portnox’s radically simple cloud-native unified access control platform. No hassles. No BS.

WEBINAR: Next Generation ZTNA (April 16 @ 12pm ET)

X