Threat Landscape

Explore the threat landscape shaping the cloud. These articles examine attacker behavior, cloud-native techniques, and how teams use intel to strengthen security decisions.

What is business email compromise (BEC)?

Wiz Expertenteam

Business email compromise is a targeted cyberattack where criminals impersonate someone you trust—like your CEO, a vendor, or a business partner—to trick you into sending money or revealing confidential information.

What are backdoor attacks in cloud environments?

Wiz Expertenteam

A backdoor attack creates a hidden method for bypassing standard authentication or security controls in a computer system, application, or network. Think of it as a secret entrance that allows attackers to return to a compromised system whenever they want, without going through the front door.

Top 9 OSINT tools

Wiz Expertenteam

Open-source intelligence (OSINT) is a framework that involves gathering, analyzing, and interpreting publicly available data to gain insights into cyber threats, adversarial activities, and attack techniques. OSINT identifies innocuous-seeming information that, if analyzed with an attacker’s mindset, could reveal critical loopholes in an enterprise’s security posture.

What is an advanced persistent threat (APT)?

Wiz Expertenteam

An advanced persistent threat is a sophisticated cyberattack where skilled hackers break into your network and stay hidden for months or even years

What are indicators of attack (IOAs) in cloud security?

Wiz Expertenteam

Indicators of attack (IOAs) are real-time behavioral signals that reveal active malicious activity in your cloud environment. Unlike static signatures, IOAs detect attacker techniques as they happen.

IOA vs IOC: Key differences explained

Wiz Expertenteam

Indicators of compromise are forensic artifacts that prove a security breach has already happened. Think of IOCs as digital fingerprints left behind at a crime scene—they're specific pieces of evidence that confirm an attacker was in your system.

What is enrichment in threat intelligence?

Wiz Expertenteam

Enrichment in threat intelligence is the process of adding context, metadata, and relationships to raw security data to make it actionable.

Dark web vs deep web: Understanding the differences

Wiz Expertenteam

While the deep web is mostly used for legitimate, private activities, the dark web hosts both illegal marketplaces and serves as a haven for privacy-seekers and activists in repressive regimes.

What is the threat intelligence lifecycle?

Wiz Expertenteam

The threat intelligence lifecycle is a continuous, six-phase process that transforms raw data about potential cyber threats into refined, actionable intelligence

What is Threat Intelligence?

Wiz Expertenteam

Threat intelligence, also called cyber threat intelligence (CTI), is the practice of gathering and analyzing trends about potential or ongoing cyber threats.