Business Email Compromise (BEC): The Billion Dollar Scam
Business Email Compromise (BEC) is a type of cybercrime where an attacker compromises legitimate business email accounts or uses spoofing to conduct unauthorized transfers of funds...
Your comprehensive reference for cyber threat intelligence terminology. Explore definitions of malware families, APT groups, attack techniques, and security concepts.
Showing 4 entries in Attack Techniques
Clear filtersBusiness Email Compromise (BEC) is a type of cybercrime where an attacker compromises legitimate business email accounts or uses spoofing to conduct unauthorized transfers of funds...
A Command and Control (C2) framework is the centralized software used by threat actors to communicate with compromised systems (implants/beacons) within a victim's network. Modern ...
A Domain Generation Algorithm (DGA) is a technique used by malware to periodically generate a large number of domain names that can serve as Command and Control (C2) rendezvous poi...
A Supply Chain Attack occurs when an adversary infiltrates a system through an outside partner or provider with access to the systems and data. This dramatically alters the risk pr...