Cybersecurity Glossary
Cybersecurity Glossary Category: Concepts & Methodology Attack Surface - The total set of points where an attacker could enter or extract data. In Malanta, this means all internet-facing assets: domains, subdomains, IPs, and certificates. Subdomain Takeover - A vulnerability where a subdomain points to a service that is no longer active. An attacker can claim that service and serve malicious content under your domain. Dangling DNS Record - A DNS record (typically CNAME)Few readersSecurity Metrics That Matter
Security Metrics That Matter Category: Concepts & Methodology Why Traditional Metrics Fall Short Security teams measure reaction speed: MTTD (Mean Time to Detect), MTTR (Mean Time to Respond). These all assume the attack is already happening. A SOC can resolve 1,000 alerts a week and still miss the domain an attacker registered yesterday. Malanta's New Metrics Exposure Correlation Index (ECI) How much of your external footprint overlaps with real adversary reconnaissancFew readersPre-Attack Prevention: How It Works
Pre-Attack Prevention: How It Works Category: Concepts & Methodology The Problem: The Readiness Gap Traditional cybersecurity measures what happens after an attack begins. But every attack has a preparation phase that current metrics miss entirely: Reconnaissance - Attackers map your people, domains, cloud surfaces, and weak spots Infrastructure Setup - They register domains, spin up servers, configure email infrastructure Staging - They load phishing kits,Few readersIoPA vs IoC: What's the Difference?
IoPA vs IoC: What's the Difference? Category: Concepts & Methodology Indicators of Compromise (IoC) - Traditional When detected: After the attack What it shows: Evidence of compromise Action: Incident response Example: Malware hash found on endpoint Indicators of Pre-Attack (IoPA) - Malanta When detected: During attacker's preparation phase What it shows: Evidence of intent Action: Pre-emptive prevention Example: Phishing domaFew readers5 Questions Every CISO Should Ask About Pre-Attack Prevention
5 Questions Every CISO Should Ask About Pre-Attack Prevention Category: Concepts & Methodology 1. Are we seeing intent before impact? Are we still relying on Indicators of Compromise that surface only after execution begins? Do our defenses detect Indicators of Pre-Attack (IoPAs) - such as malicious domain registrations, hosting activity, or cloned assets - while the attacker is still setting up? 2. Can we find and dismantle the infrastructure attackers build against us? DoFew readers