Advertisement · 728 × 90
#
Hashtag
#SecurityTermsThatSoundFake
Advertisement · 728 × 90

Information Security terms that sound fake but aren’t:
“Smishing.”

Yes, it sounds ridiculous.
No, it’s not a typo.
It’s phishing… but through SMS.

#CyberSecurity #Phishing #SecurityAwareness #SecurityTermsThatSoundFake

0 0 0 0

Information Security things that sound fake but aren’t:
“Evil Twin.”

Not a soap opera plot.
Just a rogue WiFi access point impersonating a legitimate network.

#CyberSecurity #WiFiSecurity #SecurityTermsThatSoundFake

0 0 0 0

Information Security terms that sound fake but aren’t:
“Pass-the-Hash.”

No, it’s not a weird crypto game.
It’s a way attackers move laterally without knowing your password.

#CyberSecurity #IdentitySecurity #ThreatIntel #SecurityTermsThatSoundFake

0 0 0 0

Information Security terms that sound fake but aren’t:
“Watering Hole attack.”

Which sounds like wildlife photography but actually means attackers waiting for users to visit a compromised site.

#CyberSecurity #ThreatIntel #SecurityAwareness #SecurityTermsThatSoundFake

0 0 0 0

Information Security terms that sound fake but aren’t:
“Island Hopping.”

Not a vacation strategy.
Just attackers moving from one trusted organization to another.

#CyberSecurity #SupplyChain #ThreatIntel #SecurityTermsThatSoundFake

0 0 0 0

Information Security terms that sound fake but aren’t:
“Golden Ticket attack.”

Unfortunately it does not grant access to a chocolate factory.
It does grant access to your entire Active Directory.

#CyberSecurity #ActiveDirectory #ThreatIntel #SecurityTermsThatSoundFake

0 0 0 0

Information Security terms that sound fake but aren’t:
“Living off the Land attacks.”

Which basically means attackers using your own tools against you like a digital judo move.

#CyberSecurity #ThreatIntel #SecurityTermsThatSoundFake

1 0 0 0