Skip to content

CyberSecureFox

  • Cybersecurity Guides
  • Cybersecurity Fundamentals
  • Hacker World
    • Hacker Knowledge Base
    • Chronicles of Cybercrime
  • Glossary
  • Cybersecurity News
  • English
    • Deutsch
    • Українська
    • Русский
    • Español

Cybersecurity Glossary

Your quick reference for cybersecurity terminology. Clear, concise definitions of InfoSec terms, acronyms, and technical jargon – from APT to Zero-day. Bookmark this page and come back whenever you need a refresher.


AJAX progress indicator
Search: Clear
  • 3G
  • 4G
  • 419 Scam
  • Abuse
  • Access and Resource Management Service
  • Active Directory
  • AD
  • Ad Blocker
  • Administrator
  • API
  • Application Programming Interface
  • Bluetooth
  • BT
  • CA
  • Certificate Authorities
  • Cloud
  • Cloud Computing
  • Cloud Services
  • Cloud Storage
  • Computer Virus
  • Crack
  • Cracker
  • Cybercriminal
  • Darknet
  • Dark Web
  • Deepfake
  • Directory Service
  • Executable File Packer
  • Fourth Generation
  • Global Positioning System
  • GPS
  • Hacker
  • HTTP
  • HyperText Transfer Protocol
  • Infected Computer
  • Intruder
  • Intrusion Prevention System
  • IPS
  • JavaScript
  • JS
  • Malware
  • .NET
  • Nigerian letter
  • Notarization
  • Object Linking and Embedding
  • OLE
  • Packer
  • Patch
  • Personal Network
  • Random Value
  • RAT
  • RAT Trojan
  • Remote Access Trojan
  • Salt
  • Samba
  • Synthesized Media
  • Third Generation
  • Unique Modifier
  • Virtual Private Network
  • Virus
  • VPN
  • Wi-Fi
  • Wireless Fidelity
  • Wireless Technology
  • WLAN
  • Zombie
  • Zombie Computer

most recent

** Dual-themed illustration contrasting cyber threats and secure coding practices.
Cybersecurity News

Inside PCPJack: Cloud Credential Theft Targeting Open Services

A hooded figure holds a key toward a giant cracked penguin symbol amidst dark shadows.
Cybersecurity News

How Dirty Frag Breaks Linux Kernel Security for Local Attackers

Android figure surrounded by digital security elements, with people holding phones.
Cybersecurity News

How Google’s Binary Transparency Changes Android Trust

Cybersecurity News

ZiChatBot malware hides in PyPI packages, abusing Zulip C2

Futuristic cyber security command center with detailed threat analysis displayed.
Cybersecurity News

Targeted and Mass Attacks Using cPanel CVE-2026-41940

Aerial view of a river separating North Korea and Russia, with urban landscapes.
Cybersecurity News

ScarCruft targets sqgame[.]net users with BirdCall spyware

CyberSecureFox

  • LinkedIn
  • Telegram
  • Discord

© 2026 INFO

About

About

Authors

Contact

Editorial

Editorial Standards

Corrections

Legal

Privacy Policy

Terms of Service