INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h

🔐 Cybersecurity Glossary

Over 265 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

265 terms 16 categories 47 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
22 terms
Advanced Persistent Threat APT
التهديد المتقدم المستمر
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
Brute Force Attack
هجوم القوة الغاشمة
An attack method that uses trial and error to guess passwords, login credentials, or encryption keys.
Business Email Compromise BEC
اختراق البريد الإلكتروني للأعمال
A sophisticated scam targeting organizations that regularly perform wire transfers, exploiting compromised executive email accounts.
Credential Stuffing
حشو بيانات الاعتماد
An automated attack that uses stolen username/password pairs from data breaches to attempt logins on other services.
Cross-Site Scripting XSS
البرمجة عبر المواقع
A web security vulnerability that allows attackers to inject client-side scripts into web pages viewed by other users.
Cryptojacking
التعدين الخبيث
The unauthorized use of someone else's computing resources to mine cryptocurrency.
Deepfake
التزييف العميق
AI-generated synthetic media used to impersonate individuals through manipulated audio, video, or images.
Distributed Denial of Service DDoS
هجوم حجب الخدمة الموزع
An attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users.
Fileless Malware
البرمجيات الخبيثة بدون ملفات
Malicious code that operates entirely in memory without writing files to disk, making it harder to detect by traditional antivirus.
Indicators of Attack IoA
مؤشرات الهجوم
Proactive indicators that identify attacker behavior patterns in real-time, before damage occurs.
Insider Threat
التهديد الداخلي
A security risk that originates from within the organization, typically from current or former employees or business associates.
Malware
البرمجيات الخبيثة
Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Man-in-the-Middle Attack MITM
هجوم الوسيط
An attack where the attacker secretly relays and possibly alters communications between two parties who believe they are directly communicating.
MITRE ATT&CK
إطار MITRE ATT&CK
A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of cyberattacks.
Phishing
التصيد الاحتيالي
A social engineering attack that uses deceptive emails, websites, or messages to trick individuals into revealing sensitive information.
Ransomware
برامج الفدية
Malicious software that encrypts victim's files and demands payment for the decryption key.
Social Engineering SE
الهندسة الاجتماعية
The psychological manipulation of people into performing actions or divulging confidential information.
Spear Phishing
التصيد الموجه
A targeted phishing attack directed at specific individuals or organizations using personalized information to increase credibility.
SQL Injection SQLi
حقن SQL
A code injection technique used to attack data-driven applications by inserting malicious SQL statements into entry fields.
Supply Chain Attack
هجوم سلسلة التوريد
An attack that targets the less-secure elements in a supply chain to compromise the final target.
Watering Hole Attack
هجوم حفرة الماء
An attack strategy where the threat actor infects websites frequently visited by the target group to compromise their systems.
Zero-Day Vulnerability 0-Day
ثغرة يوم الصفر
A software security vulnerability that is unknown to the vendor and for which no patch or fix is available.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.