Selki Knowledge Base
  • English
  • Spanish
  • Portuguese (BR)
Go to website
Back
Articles on:General
Learn common cybersecurity names, terminologies and other important information

Categories

  • General
  • Selki Dashboard
  • Threats
  • Vulnerabilities
  • Watchers
  • Simulated Phishing Campaigns
  • Reporting
  • Integrations
What Are Infostealers?
  • What are Infostealers?
    What Are Infostealers? Last updated: 24 November 2025 Infostealers are a type of malware designed to silently collect and exfiltrate sensitive data such as passwords, cookies, tokens and autofill details. They have become one of the most common sources of credential exposure worldwide and play a major role in account takeover (ATO), fraud, and larger security incidents. This article explains what infostealers are, how they work, and how Selki helps you detect and respond to these threats.Some readers
What Are Vulnerabilities?
  • What Are Vulnerabilities and Why Scanning for Them Matters
    What Are Vulnerabilities and Why Scanning for Them Matters Security vulnerabilities are weaknesses or flaws in systems, networks, applications or processes that attackers can exploit to gain unauthorized access, escalate privileges, damage data or disrupt operations. Detecting and remediating vulnerabilities proactively is essential to reducing cyber-risk. This article explains what vulnerabilities are, why scanning matters, and how Selki helps you incorporate vulnerability-detection intoFew readers
Common Infostealer Families
  • A Quick Look at Common Malware Families
    Malware (malicious software) covers a wide range of tools used by cybercriminals to steal data, make money and disrupt systems. For Selki, the most relevant families are those that lead directly to credential theft and account takeover, especially infostealers and banking trojans. This article gives a quick overview of common malware families and then focuses on the infostealers that matter most for credential exposure. 1. Main Malware Families (High-Level Overview) Below are someSome readers
What Is Phishing?
  • What Is Phishing?
    What Is Phishing? Last updated: 27 November 2025 Phishing is one of the oldest — and still most effective — cyber-threats, combining social engineering with technical deception to trick people into revealing sensitive data (credentials, personal info, tokens) or installing malware. Even with modern security tools, phishing remains the entry vector for a large portion of data breaches and account-takeover incidents. This article explains how phishing works today, why it remains so daFew readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
  • Send us an email
© 2025Selki Knowledge BaseWe run on Crisp Knowledge.