Official IANA port for the HyperText Transer Protocol
80
This framework for adversary tactics and techniques is used for developing threat models
MITRE ATT&CK
TLS
Transport Layer Security
One of the largest botnets to date which debuted in 2016 taking down several high profile web sites
Mirai Botnet
EXE
Executable
The sum of the SSH and FTP ports
43
This color system is used to determine the sensitivity level for intel sharing
TLP OR Traffic Light Protocol
SIEM
Security Information and Event Management
This ICS malware was used to cause damage to Iran's Nuclear program
Stuxnet
Portable Document format
The default port used for Windows RDP
3389
This intel is gathered using publicly available resources
OSINT OR Open-source intelligence
CSRF
Cross-Site Request Forgery
One of the very first recorded ransomware variants discovered in the wild
Cryptolocker
JSP
This protocol uses UDP port 161
Simple Network Management Protocol OR SNMP
This layer of the internet is not indexed by search engine crawlers and could use some light
Dark Web or Deep web
NIST
National Institute of Standards and Technologies
MalwareTech made headlines when it was discovered his contribution to this malware
Kronos
SVG
Scalable Vector Graphics
TCP and UDP Port 464
Kerberose Password Change
This term refers to an artifacts of data that help identify malicious activity
IOC OR Indicator of compromise
PIPEDA
Personal Information Protection and Electronic Documents Act
This banking trojan just doesn't want to go away, causing havoc on many organizations and has been seen emerging as late as July 2020
Emotet
OLE
Object Linking and Embedding