RadiumFox Logo
RADIUMFOXSecurity

How can we help?

Search our knowledge base or browse categories below

The Engagement Lifecycle

From initial scoping to final validation, our transparent process ensures you're informed and secure every step of the way.

1. Scoping & Discovery

We define the rules of engagement, identify assets, and determine the testing boundaries to ensure a tailored approach.

2. Reconnaissance

Our team gathers intelligence using OSINT and passive scanning to understand your attack surface from an adversary's perspective.

3. Vulnerability Analysis

We identify potential weaknesses using automated scanners and manual inspection, mapping out potential attack vectors.

4. Exploitation

Our certified ethical hackers attempt to exploit identified vulnerabilities to determine their real-world impact and depth of access.

5. Reporting

We deliver a comprehensive report detailing findings, risk levels, evidence, and actionable remediation steps for your team.

6. Remediation & Retest

After your team fixes the issues, we perform a retest to verify that the vulnerabilities have been successfully mitigated.

Cybersecurity Glossary

Decode the language of security. A comprehensive guide to the terms and concepts that define our industry.

Advanced Persistent Threat (APT)

Attack Types

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.

Black Box Testing

General

A method of penetration testing where the tester has no prior knowledge of the target system, simulating an external attack.

Blue Team

Defense

A security team that defends an organization's information systems against attackers.

Cloud Security Posture Management (CSPM)

Defense

A class of security tools that enable compliance monitoring, integration with DevOps processes, and incident response for cloud environments.

Common Vulnerabilities and Exposures (CVE)

General

A list of publicly disclosed cybersecurity vulnerabilities and exposures that is free to search, use, and incorporate into products and services.

Cross-Site Scripting (XSS)

Attack Types

A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

DDoS Attack

Attack Types

Distributed Denial of Service attack, where multiple compromised systems attack a target, such as a server, website, or other network resource, and cause a denial of service for users of the targeted resource.

Encryption

Defense

The process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.

Endpoint Detection and Response (EDR)

Defense

A cyber technology that continually monitors and responds to mitigate cyber threats.

Exploit

Attack Types

A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic.

Firewall

Defense

A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

Gray Box Testing

General

A penetration testing method where the tester has partial knowledge of the internal network or system.

Identity and Access Management (IAM)

Defense

A framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources.

Incident Response (IR)

Defense

The approach an organization takes to manage the aftermath of a security breach or cyberattack.

Insider Threat

Attack Types

A security risk that originates from within the targeted organization.

Lateral Movement

Attack Types

Techniques that cyber attackers use to progressively move through a network as they search for the key data and assets that are the ultimate target of their attack campaigns.

Malware

Attack Types

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Multi-Factor Authentication (MFA)

Defense

An authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism.

Penetration Testing

General

A simulated cyber attack against your computer system to check for exploitable vulnerabilities.

Phishing

Attack Types

A method of trying to gather personal information using deceptive e-mails and websites.

Ransomware

Attack Types

A type of malicious software designed to block access to a computer system until a sum of money is paid.

Red Team

General

A group of security professionals who act as adversaries to overcome cybersecurity controls.

Rootkit

Attack Types

A collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

Security Operations Center (SOC)

Defense

A centralized unit that deals with security issues on an organizational and technical level.

Social Engineering

Attack Types

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

SQL Injection (SQLi)

Attack Types

A code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

Threat Hunting

Defense

The process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.

Vulnerability Assessment

General

The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

White Box Testing

General

A penetration testing method where the tester has full knowledge of the system being tested.

Zero-Day Vulnerability

General

A computer-software vulnerability that is unknown to those who should be interested in mitigating the vulnerability (including the vendor of the target software).

Zero Trust

Defense

A strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization's network architecture.