About CTM360
CTM360 is a collaborative and resourceful platform which enables entities to leverage the power of collectiveness in order to address the ever-growing landscape of cyber attacks. We offer a broad-range of prevention, detection, analysis and response services.
Get in Touch
  •   Office 1002, 10th Floor
       Orchid Business Center, Seef
  •   +973 77 360 360
  •   +973 77 361 361
  •   info@ctm360.com

Threat Glossary

 Home / Resources / Threat Glossary
Term Definition
419 Email
Email address being used in Advance Fee Fraud scams that reflect an association with client's organization/Staff
Account suspension
Removal of emails or accounts with just cause
Advance Fee Fraud
Delivered via fraudsters who target victims to make advance or upfront payments for goods, services and/or financial gains that do not materialise. Types of advance fee fraud include: Career opportunity scams, clairvoyant or psychic scams
AS number
Autonomous system
Autonomous system
Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity that presents a common, clearly defined routing policy to the Internet.
Back links
A backlink is any link received by a web node (web page, directory, website, or top level domain) from another web node.
Black Hat SEO
In search engine optimization (SEO) terminology, black hat SEO refers to the use of aggressive SEO strategies, techniques and tactics that focus only on search engines and not a human audience, and usually does not obey search engines guidelines.
Brand Infringement
Brand infringement is an encroachment, violation, misappropriation, and/or disparagement of a message, identity, goodwill, talent, work, products, and intellectual property rights of a brand.
Brand Protection
The act of preventing someone from illegally making, selling or marketing a product using a brand name owned by another company, thereby protecting the original owner's brand equity.
Country Code Top-Level Domain
Cyber Espionage
The use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.
Cyber War
The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of communication systems by another state or organization.
Domain name similar to any of client domains with slight variation in spelling
Dark Web
Restricted and non-indexed. The Dark Web (also called Darknet) is a subset of the Deep Web that is not only not indexed, but that also requires something special to be able to access it, e.g., specific proxying software or authentication to gain access. The Dark Web often sits on top of additional sub-networks, such as Tor, I2P, and Freenet, and is often associated with criminal activity of various degrees, including buying and selling drugs, pornography, gambling, etc. While the Dark Web is definitely used for those things more than the standard Internet or the Deep Web, there are many legitimate uses for the Dark Web as well.
Data leakage
Client's confidential data being published anywhere on the internet inclusive of Email addresses

Contact Us

  •   Office 1002, 10th Floor,
  •      Orchid Business Center, Seef 
  •   +973 77 360 360
  •   +973 77 360 361
  • info@ctm360.com