AttackMetricx & Security Glossary

ASM (Attack Surface Management): Continuous practice of discovering, monitoring and managing all Internet-facing assets that attackers could target

CTEM (Continuous Threat Exposure Management): A continuous lifecycle (Scoping → Discovery → Prioritization → Validation → Mobilization) that identifies, validates, prioritizes and remediates real exposures rather than just listing theoretical issues.

ATSS (Actively Targeted Security Scoring): A prioritization model that elevates findings most likely to be actively targeted by attackers

Threat Exposure: The exposures from ASM, Dark Web, Brand Protection.

Passive Scanning: Collects surface data without interacting with targets (DNS records, certificates, cert transparency).

Active Scanning: Probes systems directly to detect misconfigurations, live services and exploitable vulnerabilities.

Vulnerability Scanning Engine: AttackMetricx’s proprietary engine used for active validation and exploitation-style checks (not generic scanners).

Confirmed Validation: Exposure actively validated by the engine (proof via tests like SQLi/XSS/RCE or live TLS handshake).

Potential Validation: suspected issue needing analyst review (e.g., dormant subdomain).

SPF (Sender Policy Framework): Authorizes mail senders for a domain.

DKIM (DomainKeys Identified Mail): Cryptographic signature validating message authenticity.

DMARC (Domain‑based Message Authentication, Reporting, and Conformance): Policy to enforce SPF/DKIM alignment and reporting.

CVE (Common Vulnerabilities and Exposures): Standard public identifier for a specific vulnerability.

CWE (Common Weakness Enumeration): Catalog of software weakness types.

CVSS (Common Vulnerability Scoring System): Standard scoring (v3.1, v2.0, v4.0) that measures technical severity (attack vector, complexity, privileges, impact).

EPSS (Exploit Prediction Scoring System) — Predictive score estimating probability a CVE will be exploited in the near term (used to prioritize patching).

KVE / Known Vulnerability Exploits: Curated list of vulnerabilities that are observed being exploited in the wild (platform refers to KVE and CISA KEV).

KEV (CISA Known Exploited Vulnerabilities): Government‑curated list of actively exploited CVEs.

CPR (Cyber Prioritization Rating): Business-context score that helps rank CVEs by real-world impact for your assets (platform field)

CPE (Common Platform Enumeration): Formal naming of affected product/version to map which assets are vulnerable.

Trending Vulnerabilities: Issues with rising exploitation likelihood.

SLA / Due Date: Target time for remediation based on severity/compliance.

RCE (Remote Code Execution): Attacker runs code on target systems.

Privilege Escalation: Gaining higher permissions than intended.

SQL Injection (SQLi): Injecting SQL to manipulate back‑end databases.

Cross‑Site Scripting (XSS): Injecting scripts into web pages to run in users’ browsers.

Server‑Side Request Forgery (SSRF): Forcing the server to make malicious requests.

Cross‑Site Request Forgery (CSRF): Tricking users into unwanted actions via their session.

IDOR (Insecure Direct Object Reference): Accessing objects by guessing identifiers.

Directory Listing / Open Directory: Unprotected file listings that leak data.

Sensitive File Exposure: Leaking .env, backups, Git folders, or config files.

Default/Weak Credentials: Accounts protected by trivial or factory passwords.

Known Exploited: Vulnerabilities or misconfigurations actively exploited in the wild (highest priority).

Vulnerability: Software or configuration flaw (often mapped to a CVE).

Misconfiguration: Improper settings (e.g., weak TLS, missing security headers) that increase attackability.

Risky Ports / Exposed Ports: Publicly reachable network ports which may run vulnerable services (e.g., FTP, Telnet, RDP).

Inactive Subdomain: A subdomain that no longer hosts active content or services but still points to an existing DNS record.

Takeover Risk: A security exposure that occurs when a subdomain, DNS entry, or external service points to a decommissioned or unclaimed resource. Attackers can register or claim that resource to host malicious content, impersonate the organization, or conduct phishing attacks.

Dark Web: Dark Web: Non‑indexed or hidden services used by threat actors (e.g., onion sites).

Dark Web Monitoring: Continuous scanning of underground sites, marketplaces, Telegram and forums for leaked credentials, tokens and data.

Mention: References to brand/domains/assets across dark markets and forums.

Threat Actor: Individual/group conducting malicious activity.

Credit Card Monitoring: Detection of stolen payment card data in underground markets.

VIP Monitoring: Focused tracking for executives or key staff.

Breach: Dataset leak exposing credentials or sensitive information.

Botnets: Networks of compromised devices tied to malicious activity.

Botnet Logs: Stolen data from infected devices (credentials, browser data, files).

Ransomware: A type of malicious software that encrypts a victim’s files or systems and demands payment (a ransom) in exchange for the decryption key.

Brand Impersonation: A fraudulent activity where attackers create fake websites, social media profiles, or emails that mimic an organization’s legitimate brand identity.

Typosquatting: A deceptive technique where attackers register domain names similar to a legitimate brand’s domain often with minor spelling errors or character changes (e.g., “gooogle.com” instead of “google.com”).

Homograph Attack: A sophisticated form of domain spoofing that uses visually similar characters from different character sets (such as Cyrillic or Greek letters) to create a fake domain that appears identical to the legitimate one.

Phishing Website: A cloned or malicious site aiming to steal credentials.

Takedown: Action to remove malicious/impersonating content.

Fraudulent App / Fake Social Account: Malicious apps or accounts impersonating your brand to defraud users.

PoC (Proof of Concept): Technical evidence or an exploit snippet proving a vulnerability is exploitable.

IoC (Indicator of Compromise) / Collection Indicators: Forensic traces or markers collected during validation that support threat hunting.

Scoping: Defining monitored assets (domains, subdomains, cloud services, IPs) to ensure accurate coverage.

Discovery: Continuous inventory and detection of exposures across the scoped surface.

Prioritization: Ranking findings using threat intel, EPSS, ATSS and business context to act on what matters most.

Validation: Active or manual verification to reduce false positives and confirm exploitability.

Mobilization: Assigning, tracking and coordinating remediation efforts across teams until closure.

Compliance Mapping: Linking exposures and controls to frameworks (e.g., ISO 27001, NIST CSF, SOC 2, PCI DSS, GDPR).

Control: Safeguard or countermeasure implemented to reduce risk.

MTTR (Mean Time to Remediate): Average time required to fix exposures.

KPI (Key Performance Indicator): Quantitative measures tracking security posture and process health.

Last updated

Was this helpful?