Cybersecurity Glossary

Malware & Threats

Terms about malicious software and attack methods used to compromise systems, steal data, hijack accounts, or disrupt operations.

Overview

What this category covers

This category focuses on the technical side of compromise, including the software, network tactics, and intrusion methods attackers rely on after they gain a foothold.

It gives business and security leaders a common language for explaining how different threats behave and why layered defenses matter after a user clicks or a system is exposed.

Roadmap

Planned glossary terms

These terms are already mapped to this category so new pages can be added without changing the structure.

Share This Page

Send this glossary page to a teammate, client, or employee who needs a quick explanation.

Directory

Browse the full glossary

Use the glossary index to jump across categories and follow the live entries as the section expands.