Skip to content

Glossary

Key terms used throughout ShadowMap.

TermDefinition
APTAdvanced Persistent Threat — a sophisticated, sustained cyberattack by well-funded threat actors
ASAAttack Surface Area — the total external footprint of an organization
BECBusiness Email Compromise — fraud attacks impersonating executives or business partners
C2Command and Control — infrastructure used by attackers to manage compromised systems
CARTContinuous Automated Red-Teaming — ShadowMap's automated red-teaming, alert management, and vulnerability tracking system
CISACybersecurity and Infrastructure Security Agency (US)
CT LogsCertificate Transparency Logs — public ledgers of SSL certificates
CVECommon Vulnerabilities and Exposures — standardized vulnerability identifiers
CVSSCommon Vulnerability Scoring System — severity rating for vulnerabilities
EASMExternal Attack Surface Management — the discipline of discovering and monitoring external digital assets
IOCIndicator of Compromise — observable evidence of a security incident
KEVKnown Exploited Vulnerabilities — CISA's catalog of actively exploited CVEs
MISPMalware Information Sharing Platform — open-source threat intelligence sharing framework
MITRE ATT&CKA knowledge base of adversary tactics and techniques
SLAService Level Agreement — defined response time targets for findings
Stealer LogData harvested by info-stealer malware from infected machines
TTPTactics, Techniques, and Procedures — methods used by threat actors
VRMVendor Risk Management — assessment and monitoring of third-party security posture

ShadowMap by Security Brigade