About CTM360
CTM360 is a collaborative and resourceful platform which enables entities to leverage the power of collectiveness in order to address the ever-growing landscape of cyber attacks. We offer a broad-range of prevention, detection, analysis and response services.
Get in Touch
  •   Office 1002, 10th Floor
       Orchid Business Center, Seef
  •   +973 77 360 360
  •   +973 77 361 361
  •   info@ctm360.com
open

Threat Glossary

 Home / Resources / Threat Glossary
Term Definition
Shadow IT
(or Stealth IT), is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval.
Social Media Fraud
Suspicious Profiles on any social media websites that have association with the client
Spear Phishing
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.
Takedown
Shutting down of fraudulent profiles that affect a brand or individual including cybersquatting
Text sharing sites
Uploading texts/copyright infringement
TLD
Top-Level Domain
Trademark
any word, name, symbol, or design, or any combination thereof, used in commerce to identify and distinguish the goods of one manufacturer or seller
Two-factor Authentication
Process by which a user provides two means of identification from separate categories of credentials
VeriSign
Service provider of domain names
Web Referral Log
Logs to help analyze traffic to a site
Website Defacement
Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti, although recently it has become a means to spread messages by politically motivated "cyber protesters" or hacktivists.
Whaling
Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities
WHOIS
Pronounced "who is" is a query and response protocol that is widely used for querying databases that store the registered users

Contact Us

  •   Office 1002, 10th Floor,
  •      Orchid Business Center, Seef 
  •   +973 77 360 360
  •   +973 77 360 361
  • info@ctm360.com