Skip to content

CyberSecureFox

  • Cybersecurity Guides
  • Cybersecurity Fundamentals
  • Hacker World
    • Hacker Knowledge Base
    • Chronicles of Cybercrime
  • Glossary
  • Cybersecurity News
  • English
    • Deutsch
    • Українська
    • Русский
    • Español

Cybersecurity Glossary

Your quick reference for cybersecurity terminology. Clear, concise definitions of InfoSec terms, acronyms, and technical jargon – from APT to Zero-day. Bookmark this page and come back whenever you need a refresher.


AJAX progress indicator
Search: Clear
  • 3G
  • 4G
  • 419 Scam
  • Abuse
  • Access and Resource Management Service
  • Active Directory
  • AD
  • Ad Blocker
  • Administrator
  • API
  • Application Programming Interface
  • Bluetooth
  • BT
  • CA
  • Certificate Authorities
  • Cloud
  • Cloud Computing
  • Cloud Services
  • Cloud Storage
  • Computer Virus
  • Crack
  • Cracker
  • Cybercriminal
  • Darknet
  • Dark Web
  • Deepfake
  • Directory Service
  • Executable File Packer
  • Fourth Generation
  • Global Positioning System
  • GPS
  • Hacker
  • HTTP
  • HyperText Transfer Protocol
  • Infected Computer
  • Intruder
  • Intrusion Prevention System
  • IPS
  • JavaScript
  • JS
  • Malware
  • .NET
  • Nigerian letter
  • Notarization
  • Object Linking and Embedding
  • OLE
  • Packer
  • Patch
  • Personal Network
  • Random Value
  • RAT
  • RAT Trojan
  • Remote Access Trojan
  • Salt
  • Samba
  • Synthesized Media
  • Third Generation
  • Unique Modifier
  • Virtual Private Network
  • Virus
  • VPN
  • Wi-Fi
  • Wireless Fidelity
  • Wireless Technology
  • WLAN
  • Zombie
  • Zombie Computer

most recent

Two individuals collaborating intensely over a computer screen displaying an error message.
Cybersecurity News

Gootloader Malware Uses Corrupted ZIP Archives to Evade Detection

** Pensive man in a hoodie contemplating over computer screens in a dim workspace.
Cybersecurity News

New Windows NTFS Driver Vulnerabilities Allow SYSTEM-Level Privilege Escalation

Cybersecurity News

Mandiant NTLMv1 Rainbow Tables Turn Legacy Windows Authentication into a High-Risk Liability

Mysterious hooded figure manipulating a chessboard with technology elements.
Cybersecurity News

WhisperPair (CVE-2025-36911): How a Google Fast Pair Flaw Puts Bluetooth Headphones at Risk

Cybercrime and law enforcement clash in a vivid dual-themed scene.
Cybersecurity News

Microsoft Dismantles RedVDS Bulletproof Hosting Platform Used for Global BEC and Phishing Attacks

Woman using smartphone's Select to Speak feature with warning icon displayed.
Cybersecurity News

Android Accessibility Bug Disrupts Volume and Camera Controls for Select to Speak Users

cybersecurefox.com

© 2026 INFO

PRIVACY POLICY terms of service