Information Security terms that sound fake but aren’t:
“Smishing.”
Yes, it sounds ridiculous.
No, it’s not a typo.
It’s phishing… but through SMS.
#CyberSecurity #Phishing #SecurityAwareness #SecurityTermsThatSoundFake
Information Security things that sound fake but aren’t:
“Evil Twin.”
Not a soap opera plot.
Just a rogue WiFi access point impersonating a legitimate network.
#CyberSecurity #WiFiSecurity #SecurityTermsThatSoundFake
Information Security terms that sound fake but aren’t:
“Pass-the-Hash.”
No, it’s not a weird crypto game.
It’s a way attackers move laterally without knowing your password.
#CyberSecurity #IdentitySecurity #ThreatIntel #SecurityTermsThatSoundFake
Information Security terms that sound fake but aren’t:
“Watering Hole attack.”
Which sounds like wildlife photography but actually means attackers waiting for users to visit a compromised site.
#CyberSecurity #ThreatIntel #SecurityAwareness #SecurityTermsThatSoundFake
Information Security terms that sound fake but aren’t:
“Island Hopping.”
Not a vacation strategy.
Just attackers moving from one trusted organization to another.
#CyberSecurity #SupplyChain #ThreatIntel #SecurityTermsThatSoundFake
Information Security terms that sound fake but aren’t:
“Golden Ticket attack.”
Unfortunately it does not grant access to a chocolate factory.
It does grant access to your entire Active Directory.
#CyberSecurity #ActiveDirectory #ThreatIntel #SecurityTermsThatSoundFake
Information Security terms that sound fake but aren’t:
“Living off the Land attacks.”
Which basically means attackers using your own tools against you like a digital judo move.
#CyberSecurity #ThreatIntel #SecurityTermsThatSoundFake