Skip to Content Skip to Footer
Fusion5 New Zealand
    • Applications
    • Enterprise Resource Planning (ERP)
      • Enterprise Resource Planning (ERP)
      • NetSuite
      • Microsoft Dynamics 365 Business Central
      • Microsoft Finance and Operations
      • JD Edwards
      • Resources
        • Resources
        • See how an ERP solution makes a business tick and what that could mean for you
        • Download our eBook to guide you through our fab five steps to getting RFP ready.
        • How to turn the top three retail challenges into opportunities
          See all resources
    • Customer Relationship Management
      • Customer Relationship Management
      • Dynamics 365 CRM
      • Dynamics 365 Sales
      • Dynamics 365 Marketing
      • Dynamics 365 Customer Service
      • Dynamics 365 Field Service
      • Resources
        • Resources
        • Otago Polytechnic Transforms Student Application Process With Fusion5
        • 6 data migration mistakes that will stop your CRM project in its tracks
        • Why do so many CRM implementations fail?
          See all resources
    • People Management (HR & Payroll)
      • People Management (HR & Payroll)
      • Jemini
      • Jade Star
      • EmpowerHR
      • MYOB PayGlobal
      • MyWorkplace
      • TimeFiler
    • Planning and Analytics
      • Planning and Analytics
      • Workday Adaptive Planning
      • IBM
      • BlackLine
      • Insight Software
      • Resources
        • Resources
        • AFL Streamlines Reporting with Workday
        • Why Excel and ERP aren’t financial planning best friends. And what you can do about it
          See all resources
    • Service Management
      • Service Management
      • Xurrent
      • Ivanti
      • Resources
        • Resources
        • Shellharbour City Council empowers service management
        • Optimising service management with an integrated approach
        • Why your business needs an integrated Service Management platform
          See all resources
    • Cloud Platforms
      • Cloud Platforms
      • Amazon Web Services (AWS)
      • Citrix
      • Microsoft Azure
      • Oracle Cloud Infrastructure
      • Resources
        • Resources
        • AWS Cloud Cost Optimisation eBook
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Integrating FinOps with your cloud cost optimisation strategy
          See all resources
    • Services
    • Managed Services
      • Managed Services
      • Managed Cloud
      • Managed Security
      • Managed Help Desk
      • Managed Infrastructure
      • Resources
        • Resources
        • The future of Service Management: Is each department in your business ready?
        • Optimising service management with an integrated approach
        • Overcoming common service management challenges
          See all resources
    • Consultancy and Advisory
      • Consultancy and Advisory
      • Digital Transformation Consulting
      • Programme Management
      • Organisational Change Management
      • Infrastructure
      • Security
      • Resources
        • Resources
        • Why is project governance such a big deal in an ERP implementation?
        • When it comes to successful delivery, hybrid is the passport to success for most projects.
          See all resources
    • Security
      • Security
      • Endpoint Detection and Response
      • Governance, Risk & Compliance
      • Security Operations Centre
      • Modern Work
      • Resources
        • Resources
        • Cyber threats in 2024: A growing menace
        • Build a stronger cybersecurity defence today
        • The rising tide of cyber threats: How prepared are you?
          See all resources
    • Cloud Services
      • Cloud Services
      • Cloud Migration
      • Cloud Advisory
      • Cloud Engineering
      • Cloud Platforms
      • Resources
        • Resources
        • Dive deep into cost optimisation for your Azure environment with our comprehensive guide. 
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Unlock your cloud's full potential: A guide to cost optimisation
          See all resources
    • Infrastructure
      • Infrastructure
      • Virtual Workspaces
      • Server and Database Management
      • Resources
        • Resources
        • Dive deep into cost optimisation for your Azure environment with our comprehensive guide. 
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Unlock your cloud's full potential: A guide to cost optimisation
          See all resources
    • Data and AI
    • Integration
    • Customer Success Team
      • Customer Success Team
      • PartnerPlus
      • Help Desk
    • Outsourced Payroll Services
      • Outsourced Payroll Services
      • Outsourced Payroll Services
      • Remediation as a Service
    • Industries
    • All industries
    • Agribusiness
    • Education
    • Financial Services
    • Manufacturing
    • Professional Services
    • Wholesale Distribution
    • Strategic Partners
    • Microsoft
      • Microsoft
      • Microsoft overview
      • Products
        • Products
        • Dynamics 365 Customer Engagement (CRM)
        • Dynamics 365 Finance and Operations (ERP)
        • Dynamics 365 Business Central
        • Microsoft Azure
        • Microsoft Copilot
      • Services
        • Services
        • Licensing
        • Premier Support
        • Modern Work
      • Industries
        • Industries
        • Construction
        • Education
        • Financial Services
        • Manufacturing
        • Food and Beverage
        • Not for Profit
        • Local Government
      • Resources
        • Resources
        • Snell transforms operations with Microsoft Dynamics 365 Finance and Operations
        • Right-size your Dynamics 365 storage and licences before August 30, 2025
        • Adopting Microsoft Copilot
          See all resources
    • Oracle
      • Oracle
      • Oracle overview
      • Products
        • Products
        • NetSuite
        • JD Edwards
      • Resources
        • Resources
        • BLUNT Umbrellas unfolds sustainable technology strategy
        • Namoi Cotton strengthens cybersecurity with Fusion5
          See all resources
    • Amazon Web Services (AWS)
    • Partner Ecosystem
  • Insights & Resources
Contact Us

Translating the technobabble: Cybersecurity this-and-that glossary

Blogs

You have to give brownie points for creativity to those who come up with the names of the attacks, scams, and everything else spewed out by the cybercriminal fraternity.  

But that’s where the kudos stops. Despite the often flippant names and terms involved, cybercrime is rated by the World Economic Forum as one of the Top 10 Global Risks for 2023.

Let’s start with the who’s who of cybercrime.

Bad actor. Not found on the Golden Raspberry list, instead, a cybercriminal or organisation that will do anything, but anything, to exploit vulnerabilities in your network for financial gain by using ransomware, malware, or by intercepting communications. Common tactics are to steal your data or shut you down (and demand dosh for regaining access to your own network/applications). Aka threat actors and malicious actors.   

Hacktivists. As you can probably glean from the name, they are criminals who illegally access your files or network for social or political ends.   

Threat groups. Groups usually have unique names, often reflecting where they are from, and their speciality. Names may include Panda if they originate from China (e.g., Numbered Panda, Emissary Panda), or Bear from Russia (e.g., SaintBear, VOODO BEAR, Cozy Bear). If non-state affiliated, they may include Spider (e.g., Wizard Spider, Viking Spider) for a financially motivated group, and Jackal if they are hacktivists. 

And where do they hang out?

The dark web, or deep and dark web (DDW). This spider-free zone is an online shopper’s delight for bad actors. Here, they can purchase cyber-attack kits for DDoS, Phishing, and ransomware attacks for less than $50US. There’s also a bargain basement selection starting at $5US. Actors need to part with a whole hard-earned $10US for a password-cracking tool, and a whopping $12US for malware suites containing Trojans, worms, viruses, and other harmful programmes. Prices go up according to the newness of the version.  

Now, the attacks. Where do these colourful names come from?

Interestingly, there are often naming conventions. Some are titled depending on their target (for example, the Olympic Destroyer targeted the Winter Olympics in South Korea), or unique aspects of the attack (like a Meltdown which opened up networks to attacks leading to a meltdown). And others are named due to their function. For example, <add adjective> Downloader.  

But - on to the 10 most popular forms of attacks.  

Malware. Stemming from the term malicious software, malware is any programme or code that’s been created with the sole intent of doing harm to your computer, network, or server. Malware is the most common form of cyberattack, mostly because it includes a wealth of subsets like ransomware, trojans, spyware, viruses, worms, keyloggers, bots, and cryptojacking. 

Denial-of-Service (DoS) Attacks. In a return to the IT acronyms we all know and love, a DoS attack is a malicious, targeted attack originating from one system that floods your network with false requests to disrupt your business operations. When this happens, your users can no longer carry out routine and necessary tasks, like accessing email, websites, online accounts, or other resources that are operated by DoS attack-impacted computers or networks. DoS attacks don’t usually mean lost data and can be sorted out without paying a ransom, but they take up an inordinate amount of time, money, and effort to sort out and get you back to business as usual. To note, DDoS (Distributed Denial of Service) attacks do the same thing but are launched from multiple systems, making them harder to block and neutralise.  

Phishing. Sounds cute, huh? Well, it’s not. It’s the coverall term for using a digital platform to mess with your employees. When they use email, it’s Spear Phishing, SMS is called SMiShing, via phone it’s Vishing, and when they utilise social media, and social engineering techniques to go after big name business, it’s referred to as Whaling. But no matter the phishing tool being used, the end goal is always to entice your staff to share sensitive information like their system passwords or your bank account numbers, or to download a malicious file that installs viruses on their computer or phone.    

Spoofing. While it sounds vaguely comical, spoofing is far from it. Spoofing is a technique used by cybercriminals to disguise themselves as a source that you know or trust. Like your boss, or a website you use all the time. In so doing, they can trick you into providing access to your systems or devices so they can steal information, extort money, or install malware or other nasties on the device. 

Identity-Based Attacks. Identity-driven attacks where a valid user’s credentials have been taken over by a criminal can be extremely difficult to detect using traditional security measures and tools. Scarily, 80% of all breaches use compromised identities and can take up to 250 days to identify. Types of identity-based attacks include Kerberoasting, Man-in-the-Middle (MITM), Pass-the-Hash (PtH), Silver Ticket, Credential Stuffing, Password Spraying, and Brute Force Attacks. 

Code Injection Attacks. You’ve probably guessed this one. Yes, it’s when an attacker injects malicious code into a vulnerable computer or network to change its course of action. These attacks include SQL Injection, Cross-Site Scripting (XSS) and Malvertising.  

Supply Chain Attacks. Targeting one of your trusted third-party vendors who offers services or software vital to your supply chain – this attack injects malicious code into an application to infect everyone who uses it. Hardware supply chain attacks compromise the physical components for the same purpose. However, software supply chains are especially vulnerable as modern software isn’t written from scratch. It usually involves many off-the-shelf components, like third-party APIs, open-source code, and proprietary code from software vendors. 

Insider Threats. Danger is closer than you think! Insider threats are internal actors such as current or former (usually malicious) employees that present a risk to your organisation because they have direct access to your company network, sensitive data, and intellectual property (IP). They also tend to know your business processes, company policies and other sensitive information needed to carry out such an attack. These attacks are usually financially motivated. However, negligence can also be behind this type of attack – which is why cybersecurity training is so important.  

DNS Tunneling. Imagine a private access tunnel used by an attacker to release malware into, or extract data through. DNS Tunneling is a type of cyberattack that leverages domain name system (DNS) queries and responses to bypass your traditional security measures and transmit data and code within your company network. Once infected, the hacker can freely engage in command-and-control activities. Simple to deploy, DNS tunnel has increased in popularity over the years and bad actors can readily access tunneling toolkits and guides through mainstream sites like YouTube.  

IoT-Based Attacks. This type of cyberattack targets your Internet of Things (IoT) device/s or network. Once they’re in, the hacker can assume control of the device to steal your data, or even join a group of infected devices together to create a botnet to launch DoS or DDoS attacks. Connected devices are responsible for nearly 66% of mobile network infections – which is more than double the volume experienced in 2019. 

And there you have it – a glossary of cyber-crime and cyber-security terms to help keep you informed, safe, and on the lookout for the next sketchy character or plot! 

Written with the input of Kristy Brown (NZ Country Manager – Microsoft), because we value human thought leadership over AI-generated content.   

Ready to say yes to profitability, happy employees and great customer service?

Let's talk.

Read next

Blog

Translating the *technobabble:* Freeing up resources

Blog

Is manufacturing in Australia and NZ dead or alive?

With 93% of Australians preferring to buy products made in Australia and 89% believing more manufacturing should be undertaken on home soil, it's only a matter of time before manufacturers leverage the global disruptions in favour of consumer demand. Read more here. 

Blog

Why remote workers and employers need cloud ERP now, more than ever!

Employees can’t count on working from just one place any time soon, and ‘uncertainty’ is the new catch cry for 2022. Being adaptable has never been more important. Learn about the benefits of Cloud ERP in this Fusion5 blog. 

Chat with Bernie
Hello, you’re speaking with Bernie!
Bernie ×

Great outcomes start with great conversations

Let's chat

  1. Home
  2. Blogs
  3. Translating the Technobabble Cybersecurity this and that Glossary

Fusion5

  • Contact Us
  • About Us
  • Our People
  • Careers
  • Infusion
  • Marketplace
  • Submit an RFP

New Zealand Offices

  • Wellington (04) 473 4552
  • Auckland (09) 379 0525
  • Christchurch (03) 943 4369
  • Dunedin (03) 474 1819
  • English (Australia) Visit Fusion5 Australia

Our Partners

  • Microsoft
  • NetSuite
  • JD Edwards
  • IBM
  • Workday Adaptive Planning
  • Fusion5 New Zealand
  • Privacy Policy
  • Privacy Settings
  • © 2025 Fusion5 Limited
  • Consultant Login