Securely store, share, and manage your files with an advanced, easy-to-use, and highly customizable platform
CyberGrant protects every aspect of your digital security
Discover the modular solutions designed to protect your company from external and internal threats, as well as new challenges like AI.
Digital asset protection
Automatic classification
Cloud encryption
Email protection
Anti-phishing
Malware blocking
Insider threat
Remote access
Application control
Zero trust
Zero-day defense
Surface scan
Vulnerability check
Pen Test
Ransomware simulation
Phishing test
DDoS simulation
Tailored cybersecurity for every business.
Scalable solutions compatible with legacy systems, designed for both SMEs and large enterprises requiring full control over data, access, and sharing.
Discover security features to protect your data, files, and endpoints
Securely store, share, and manage your files with an advanced, easy-to-use, and highly customizable platform
Control every credential like a file. Share, track, and revoke access instantly.
RemoteGrant protects your business from attacks and data loss by enabling employees to securely access workstations and files from anywhere.
Encrypt every email and keep control of attachments, even after sending.
AIGrant is your personal assistant - it understands your data, keeps it secure, and delivers exactly what you need.
Compromise of an account, for example through phishing.
Illegal takeover of an account in order to impersonate the victim, for example to perform financial transactions.
European project aimed at providing solutions and building knowledge to help organizations across Europe fight botnets.
A class of systems built around operational autonomy, advanced contextual reasoning, and multi-level decision-making.
Providers that give customers information services on online payment accounts, such as balances and transaction history.
AI capable of making decisions and acting autonomously to pursue a specific goal.
On-demand data analytics services that can also be used for security purposes.
Technique used to identify and assess the potential paths an attacker could use to breach a system or network.
Complex attacks targeting specific organizations, characterized by reconnaissance, sophisticated tools, and long-term persistence.
A vulnerability that allows an attacker to access files through remote web requests.
A security mindset that assumes a compromise will eventually occur, so teams prepare to detect, investigate, and contain it quickly.
An attack in which a public-cloud resource is compromised to gather information that is later used against the on-premises environment.
Technique that lets cybercriminals schedule and run malicious background downloads without attracting attention.
Technology that records transactions on an immutable distributed ledger maintained across multiple nodes.
Paid tools used to launch DDoS attacks.
A dynamic indicator of the effort required to assure the security of an element based on risks affecting all of its assets.
Software deployed on portable electronic devices to intercept communications or in-person conversations.
Trading stolen credit card, debit card, or bank-account information for financial fraud.
A security approach that gives SecOps teams the capabilities needed to monitor, detect, and stop cloud-specific attacks.
A phishing scam targeting senior executives such as CEOs, presidents, or CFOs.
A holistic, multidisciplinary approach to security management that breaks down traditional silos across teams and functions.
The collection of information from closed, non-publicly accessible sources.
An attack in which compromised cloud virtual machines are used as a launching point to attack and control many other machines.
A category of solutions that combines multiple security capabilities into one platform to protect cloud applications.
A form of information warfare focused on attacking, disrupting, or defending computer networks and systems.
A payment made without the physical presence of the payment card, such as an online purchase.
A plan describing operational strategies and actions; in cyber intelligence it refers to actions taken by attackers or defenders.
Within a CERT, the group or population that the service supports.
An access approach that adapts decisions based on the dynamic risk level of the specific transaction.
Hosts used to send commands to infected machines and manage botnets.
The identification, assessment, neutralization, and exploitation of intelligence activities conducted by adversarial entities.
A method for identifying, prioritizing, and mapping response actions in the event of possible intrusions.
An attack that uses previously stolen username/password pairs to attempt account access.
The illegal use of a victim’s computing resources to mine cryptocurrency.
Malware that encrypts files on an infected device in order to demand a ransom.
A platform created to support monitoring and investigations related to terrorism on the internet.
A vulnerability scoring system that produces both numeric and qualitative severity ratings.
The discipline of collecting and analyzing heterogeneous data to understand threats and support effective defensive action.
Espionage conducted through illicit cyber techniques.
A model defined by Lockheed Martin to support threat detection and response decision-making.
The practice of registering or using third-party domain names, especially valuable brands, for profit.
An organization’s ability to withstand an attack and restore normal operations afterward.
Systems built to automatically identify vulnerabilities in complex networks using cognitive algorithms.
Malware or hardware designed or used to cause harm in cyberspace.
The intelligence discipline applied to the cyber domain, including strategic and contextual analysis.
A security device that allows one-way data flow only.
Unauthorized transfer or exposure of confidential information.
Distributed denial-of-service attacks carried out through a botnet or network of devices.
A rented or on-demand DDoS attack service.
The set of activities used to verify whether content is false or misleading.
A strategy that uses multiple layered controls so other defenses remain active if one layer fails.
Deep-learning techniques capable of generating fake photos or videos.
The portion of the web not indexed by standard search engines.
A symmetric-key data-encryption algorithm.
Algorithms used by some malware families to generate large numbers of domain names.
A structured framework for the technical analysis of possible intrusions.
A virtual and dynamic representation of a physical system updated in real time through sensors.
In blockchain, the ability to make digital information such as files or payments non-duplicable.
An email-authentication standard that helps prevent spoofing and phishing.
An attack in which false IP-to-domain mappings are inserted into a DNS cache.
A vulnerable system abused to amplify DDoS attacks.
A set of specifications that improves the integrity and security of DNS information.
Attacks intended to make services unavailable.
Ransomware attacks that encrypt files and also threaten to publish stolen data.
Software whose role is to fetch additional malicious components after the initial infection.
An attack in which simply visiting a malicious page can trigger malware installation by exploiting vulnerabilities.
An attack that uses IP spoofing and vulnerable reflectors to amplify traffic toward the victim.
Code whose purpose is to install malware on the victim's computer.
In VoIP, an attack similar to man-in-the-middle used to spy on, record, and steal information.
Linux kernel technology that enables real-time network monitoring and filtering with low overhead.
Tools designed to continuously monitor suspicious events on endpoints and support ongoing threat response.
An enterprise-wide information model that connects data across organizational functions to support visibility and future planning.
European railway signaling and speed-control system designed to improve interoperability and safety.
In AI systems, an attack that manipulates input data to confuse a trained model's classification.
Code or techniques used to take advantage of a system vulnerability.
Applications that let even non-expert attackers automatically exploit vulnerabilities.
Public-facing applications such as websites.
A technique that hides malicious DNS infrastructure behind a constantly changing network of compromised machines.
Code created to correct software errors or vulnerabilities.
A fraud scheme in which a fake insurance policy is sold to a victim.
A tunneling protocol that encapsulates network-layer protocols inside point-to-point virtual links.
Expressions that spread, incite, promote, or justify hatred or intolerance.
A strategy of collecting encrypted data today for decryption later when stronger computing becomes available.
Short-lived but frequent attacks occurring over a limited time window.
A key industrial-systems component that lets operators interact with control and monitoring environments.
An isolated decoy asset used to attract attacks and collect intelligence about them.
An attack that abuses slow, persistent HTTP POST requests to exhaust web-server resources.
The intelligence discipline based on human sources.
A device or mechanism used to forcefully stop an activity.
Industrial automation and control systems including hardware, software, processes, and people.
Replacement of bank-account payment details or e-wallet coordinates to divert funds.
A protocol used by network devices to exchange control information and messages.
Industrial control systems.
A device or tool that identifies patterns associated with possible attacks.
A tool used to govern identities and manage provisioning, reprovisioning, and deprovisioning of access.
A unique code identifying a mobile device.
An international unique identifier combining subscriber, country, and telecom operator information.
The application of IoT to biological systems, using devices that collect biometric, physiological, and behavioral data.
The process of managing an information-security incident.
The use of information collection, processing, management, and dissemination to gain an advantage.
Malware designed to steal information such as credentials from an infected device.
A phishing technique in which data entered by the victim on a clone site is used almost in real time against the legitimate site.
In VoIP, interception of legitimate communications and their alteration to degrade or disrupt service.
Spyware or intrusion software that may be used for legitimate security testing or unlawful surveillance.
Information useful for identifying a potential attack even before direct attacker-to-target interaction occurs.
Artifacts or data points that can be used to identify potentially compromised systems.
A DDoS technique that abuses IP packet fragmentation.
A low-level interface used for out-of-band hardware management of servers.
A device or tool able to identify and actively prevent attacks.
An ISO-aligned standard defining security requirements for industrial automation and control systems.
Strategies, processes, and technologies used to detect, analyze, and respond to attacks targeting digital identities.
Intentional interference with an electromagnetic signal in order to disrupt or prevent its proper reception.
An attack technique that abuses native tools already present in the operating system.
A technique in which attackers abuse trusted or already-present tools and services to conduct malicious activity with lower detection risk.
A service model in which one group develops malware while others distribute it to customers.
The use of online advertising as a vehicle for delivering malware.
A technique that intercepts information sent by the victim, such as login credentials, inside the browser session.
Interference with navigation signals, such as GPS, to alter location information.
Software often used on web servers to cache data and reduce database or backend traffic.
An attack in which the user is bombarded with MFA prompts until one is eventually approved.
A web-server attack based on remotely uploading malware or oversized files.
The creation of new cryptocurrency through the computational power of blockchain participants.
An attack in which malware replaces a user's cloud synchronization token with the attacker's token.
People used to convert illegal proceeds into cash, often through money laundering.
A protocol used to synchronize clocks across network-connected devices.
A platform designed to collect and share reports of suspicious online financial transactions in real time.
External data sources that feed a blockchain smart contract and can trigger or influence its execution.
The practice of gathering intelligence from publicly available sources.
Hardware and software used to monitor and manage physical assets in industrial and similar environments.
The harmful functional component of malware.
A password embedded directly in software code.
A technique that redirects a victim to a fake but look-alike site in order to steal credentials.
Personal information related to a person's physical or mental health and associated care or payment data.
A technique that tricks a victim through fake communications into visiting a clone site to steal credentials.
Hacking activity targeting phone systems.
An attack based on continuously sending ping requests to the victim system.
An attack that sends malformed ping packets intended to crash the target's networking stack.
Information requirements that guide priorities in intelligence planning.
The ability to deny knowledge of harmful actions when no proof exists to show otherwise.
In AI, an attack that contaminates training data so the model behaves incorrectly.
Scanning multiple systems for a specific open port.
A social-engineering technique in which an attacker uses a fabricated story to gain a victim's trust.
Apparently legitimate inputs that contain malicious instructions capable of altering system behavior.
Psychological operations intended to influence the opinions and behavior of foreign groups, organizations, or individuals.
Short, frequent attacks over a limited time frame.
Technology that uses quantum mechanics to create secure communication channels for exchanging keys.
A trust-service provider formally qualified by the supervisory authority to deliver qualified trust services.
An attack that uses malicious QR codes to send victims to fraudulent sites or trigger malware downloads.
A protocol used for remote communication and access between computers.
A regulation replacing the previous directive and introducing cybersecurity requirements for machinery.
The ability of an organization to absorb shocks and adapt to a continuously changing environment.
A cloud attack that attempts to lock access to resources by compromising the victim's public-cloud account.
A set of practices that ensures AI systems behave ethically and remain controllable, explainable, and accountable.
The search and collection phase in OSINT, focused on gathering data about a selected target.
Malware that enables covert control of a device while hiding itself and other malicious software.
A security approach built around a Zero Trust model for tightly controlled access.
Static code analysis used to identify vulnerabilities in applications.
A nested inventory of software products, components, and suppliers present within the organization.
A center where network traffic is analyzed and cleaned of malicious components.
A digital-identity model in which users retain full control over their own data.
VoIP attack techniques that misuse the victim's telephony infrastructure to generate traffic to premium-rate numbers.
Unsanctioned use of AI tools and models by users outside proper governance and controls.
Attacks that exploit indirect information leakage, including attempts to colocate virtual machines on the same physical host.
A system for collecting and normalizing logs and correlating security events.
The intelligence discipline based on collecting and analyzing signal and electromagnetic-emission information.
A technique that redirects network traffic to a specific server for analysis or containment.
A protocol for sharing files and printers across local networks.
A term used to indicate near-conclusive evidence that a crime was committed.
An approach that orchestrates security technologies and automates data collection, analysis, and response.
A center responsible for running security functions and monitoring events that may represent threats.
A VoIP form of identity theft aimed at impersonating a user to carry out harmful actions.
The branch of OSINT focused on collecting information from social networks.
Standard procedures describing the steps to follow during OSINT investigations and repeatable operations.
A phishing attack carefully targeted at specific individuals or groups.
The falsification of information, such as the sender address of an IP packet.
Malware that collects information about a victim's behavior and sends it to the attacker.
An attack technique based on malicious SQL queries sent to a database.
The security level actually achieved.
The required target security level.
A program that embeds security from the earliest design stages and follows the full software life cycle.
A protocol that automatically discovers and advertises devices on a network.
An encrypted protocol that allows remote interaction with network devices or servers.
Solutions for SaaS environments that continuously monitor security settings, user permissions, and external connections.
A technique for hiding information inside another medium such as an image, video, or audio file.
A structured language for describing and automatically sharing cyber threat intelligence across organizations.
An intentional but unauthorized act that modifies a system, system components, intended behavior, or data.
A methodology used to detail possible threats to a product and assign risk levels.
A protocol used to exchange STIX-described cyber threat intelligence over HTTPS.
An attack in which spoofed SYN packets prevent proper completion of the TCP three-way handshake and exhaust server resources.
A technique that lets multiple devices share a communication channel in predefined time slots.
Techniques that abuse IP spoofing and vulnerable hosts to greatly amplify attack traffic.
Techniques that abuse exposed hosts as reflectors to redirect and magnify attack traffic toward the victim.
A protocol used to share sensitive information according to clearly defined dissemination levels.
A protocol used for secure communications over TCP/IP networks, succeeding SSL.
The combination of methods, capabilities, and resources an attacker uses to carry out operations.
A natural or legal person providing one or more trust services.
Technology that learns normal user behavior and later flags anomalous activity.
A mass flood of UDP packets sent to a target host to exhaust its resources.
A network protocol that enables devices to automatically connect to and share services on a network.
A remote desktop-sharing tool.
The process of identifying participants in a blockchain environment.
The extension of Human Intelligence methods into virtual environments.
The voice-based variant of phishing.
The small disk area at the start of a partition containing code used to load and start the operating system.
A targeted attack in which a website regularly visited by the target is compromised.
The modification of files or documents to turn them into effective delivery mechanisms for malicious code.
A technique that makes the user's browser display content different from what is actually on the visited site.
A toolkit that provides five principles to help organizations prepare for a secure quantum economy.
A specialized form of spear phishing in which the attacker impersonates a senior executive to deceive an internal employee.
A class of malware whose sole purpose is to destroy or erase the target system.
Tools that unify security-solution components into a single platform for detection and incident response.