Skip to content

CyberSecureFox

  • Cybersecurity Guides
  • Cybersecurity Fundamentals
  • Hacker World
    • Hacker Knowledge Base
    • Chronicles of Cybercrime
  • Glossary
  • Cybersecurity News
  • English
    • Deutsch
    • Українська
    • Русский
    • Español

Cybersecurity Glossary

Your quick reference for cybersecurity terminology. Clear, concise definitions of InfoSec terms, acronyms, and technical jargon – from APT to Zero-day. Bookmark this page and come back whenever you need a refresher.


AJAX progress indicator
Search: Clear
  • 3G
  • 4G
  • 419 Scam
  • Abuse
  • Access and Resource Management Service
  • Active Directory
  • AD
  • Ad Blocker
  • Administrator
  • API
  • Application Programming Interface
  • Bluetooth
  • BT
  • CA
  • Certificate Authorities
  • Cloud
  • Cloud Computing
  • Cloud Services
  • Cloud Storage
  • Computer Virus
  • Crack
  • Cracker
  • Cybercriminal
  • Darknet
  • Dark Web
  • Deepfake
  • Directory Service
  • Executable File Packer
  • Fourth Generation
  • Global Positioning System
  • GPS
  • Hacker
  • HTTP
  • HyperText Transfer Protocol
  • Infected Computer
  • Intruder
  • Intrusion Prevention System
  • IPS
  • JavaScript
  • JS
  • Malware
  • .NET
  • Nigerian letter
  • Notarization
  • Object Linking and Embedding
  • OLE
  • Packer
  • Patch
  • Personal Network
  • Random Value
  • RAT
  • RAT Trojan
  • Remote Access Trojan
  • Salt
  • Samba
  • Synthesized Media
  • Third Generation
  • Unique Modifier
  • Virtual Private Network
  • Virus
  • VPN
  • Wi-Fi
  • Wireless Fidelity
  • Wireless Technology
  • WLAN
  • Zombie
  • Zombie Computer

most recent

Siberian tiger watches over a snowy landscape and river in a city setting.
Cybersecurity News

Claude Opus 4.6: AI-Powered Vulnerability Discovery for Open Source Security

Golden Gate Bridge spans a bay with people and wildlife enjoying the waterfront.
Cybersecurity News

Flickr Data Breach: Third‑Party Email Provider Exposes User Contact Details

Individuals monitoring cyber threats in a futuristic command center setting.
Cybersecurity News

DKnife: Stealthy Linux Framework Turns Routers into Man‑in‑the‑Middle Platforms

Four individuals examine technology and symbols of cybersecurity at a dimly lit table.
Cybersecurity News

OpenClaw AI Skills Hit by Malware Wave: VirusTotal Integration and New Security Controls

South Korean traders analyze Bitcoin trends with coins and charts.
Cybersecurity News

Bithumb’s 620,000 BTC Payout Error: A Critical Lesson in Crypto Exchange Operational Risk

Close-up of a dusty Ethernet connection with circuit board and code display.
Cybersecurity News

Critical n8n Vulnerability CVE-2026-25049 Enables Sandbox Escape and Remote Code Execution

cybersecurefox.com

© 2026 INFO

PRIVACY POLICY terms of service