Selki Knowledge Base
  • English
  • Spanish
  • Portuguese (BR)
Go to website
Back
Articles on:General
Learn common cybersecurity names, terminologies and other important information

Categories

  • General
  • Selki Dashboard
  • Threats
  • Vulnerabilities
  • Watchers
  • Simulated Phishing Campaigns
  • Reporting
  • Integrations
What Are Infostealers?
  • What are Infostealers?
    Infostealers: Understanding the Threat Landscape What Are Infostealers? Infostealers (also known as information stealers or credential stealers) are a category of malicious software designed to extract sensitive information from infected systems. These sophisticated threats operate covertly, harvesting valuable data including login credentials, personal information, financial details, and system configurations without the user's knowledge. Unlike ransomware or other disruptive malware, infSome readers
What Are Vulnerabilities?
  • What Are Vulnerabilities and Why Scanning for Them Matters
    What is a Vulnerability? A vulnerability is a weakness in a computer system, software, or network that could be exploited by hackers to gain unauthorized access, steal data, or cause harm. Think of it like a crack in the wall of your house — if left unfixed, someone could break in. Common examples of vulnerabilities include: Outdated software with known security holes Weak or default passwords Misconfigured settings Unsecured web applications What is a Vulnerability Scan? ASome readers
Common Infostealer Families
  • A Quick Look at Common Malware Families
    What is an Infostealer? Unlike ransomware or viruses that cause obvious damage, infostealers are silent and fast, often completing their task in seconds before deleting themselves or staying dormant. Common Infostealer Families Here are some of the most active and widespread infostealer malware families:Some readers
What Is Phishing?
  • What Is Phishing?
    What is Email Phishing and How Can You Protect Yourself? What is Email Phishing? Email phishing is a type of cyberattack where threat actors send deceptive emails designed to trick recipients into revealing sensitive information—such as login credentials, financial details, or other personal data. These emails often impersonate trusted entities like banks, tech companies, government agencies, or even your employer or coworkers. Phishing emails may contain: Fake login pages to steal yFew readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
  • Send us an email
© 2025Selki Knowledge BaseWe run on Crisp Knowledge.