Ransomware is malicious software or related extortion activity that aims to block access to data or systems and pressure an organization into paying or complying.
Business email compromise is fraud that abuses trusted business communication, especially email, to trick people into making payments, sharing data, or approving risky actions.
Credential stuffing is an attack in which stolen username and password pairs are tried against other login systems in the hope that users reused the same credentials.
A supply chain attack compromises a trusted supplier, dependency, update path, or related upstream relationship so downstream targets are affected indirectly.
Persistence is the ability of unauthorized access or malicious code to remain active or regain access over time instead of disappearing after the first interruption.
A watering hole attack is a strategy that targets a website or online service commonly used by a specific group in order to reach that group indirectly.
Data exfiltration is the unauthorized movement of data out of a system, environment, or organization to a destination not approved for that information.
Ransomware as a service is an organized criminal business model in which ransomware tooling and supporting infrastructure are offered to affiliates who carry out attacks.
Sandbox evasion is behavior intended to avoid, confuse, or outlast analysis environments so suspicious code or activity is less likely to be understood or flagged during automated inspection.
Fileless malware is malicious activity that relies heavily on in-memory execution, built-in tools, or transient artifacts rather than depending only on obvious malicious files written to disk.