What is threat research?
Counterintelligence gathering effort where security companies and researchers attempt to discover the TTP (techniques, tactics and procedures) of threat actors.
What is foot printing and fingerprinting? What are the differences?
an enumerating/ information gathering attack.
Footpringting allows a threat actor to discover topology and general configuration of the network and security systems.
Fingerprinting allows a threat actor to identify device and OS types and versions.
what is pharming?
Where an attacker sets up a false website to imitate a real one.
A type of social engineering spoofing attack.
What is a BEC attack?
Business Email compromise.