GLOSSARY

Cybersecurity Glossary

Clear and concise definitions of essential cybersecurity terms, from infostealers to dark web monitoring.

glossary combo list cybersecurity

Combo List: Understanding This Threat to Your Credentials

A combo list is a file containing millions of stolen email-password pairs. Learn where they come from, the risks they pose, and how to protect your organization.

Stealed
Read
glossary credential stuffing cybersecurity

Credential Stuffing: How Attackers Exploit Stolen Passwords

Credential stuffing is an automated attack that tests stolen credentials across multiple services. Learn how it works and how to defend against it.

Stealed
Read
glossary CTI cyber threat intelligence

CTI (Cyber Threat Intelligence): Why and How to Use It

CTI is the discipline of intelligence on cyber threats. Learn about its 3 levels, why businesses need it, and how Stealed fits into a CTI strategy.

Stealed
Read
glossary dark web monitoring

Dark Web Monitoring: Watching for Credential Leaks

Dark web monitoring is the process of scanning cybercriminal spaces for leaked data. Learn how it works and why it is essential for your organization's security.

Stealed
Read
glossary infostealer cybersecurity

Infostealer: The Malware That Silently Steals Your Credentials

An infostealer is malware that steals your credentials and passwords. Learn how it works, why it threatens your business, and how to protect yourself.

Stealed
Read
glossary MFA 2FA

MFA and 2FA Against Infostealers: Understanding the Limits in 2026

MFA is necessary but insufficient against modern infostealers that steal session cookies. SMS, TOTP, push, FIDO2 compared, AiTM phishing explained, defense in depth recommendations.

Stealed
Read
glossary SIEM cybersecurity

SIEM: Understanding Its Role in Threat Detection

A SIEM collects and analyzes security logs to detect threats. Learn how it works, why it matters, and how Stealed complements your SIEM deployment.

Stealed
Read