Phishing
Crypto Wallet Drain Scam — Seed Phrase Theft & Token Approval Abuse
Crypto wallet drain scams target users through seed phrase phishing, malicious token approvals, and fraudulent websites designed to steal digital assets. This SECMONS record explains how wallet drain schemes operate and how to prevent loss.
Phishing — Enterprise Credential Harvesting & Initial Access Technique
Phishing is a social engineering technique used to obtain credentials, deliver malware, or establish initial access into enterprise environments. This SECMONS record explains phishing mechanics, campaign evolution, and defensive controls.
Initial Access — The First Stage of a Cyber Intrusion
Initial Access refers to the techniques attackers use to gain their first foothold inside a target environment. This SECMONS glossary entry explains common initial access vectors such as phishing, drive-by compromise, exploitation of public-facing applications, and credential abuse, and how defenders should assess and reduce exposure.
Multi-Factor Authentication (MFA) — Adding Layers to Account Security
Multi-Factor Authentication (MFA) is a security control that requires users to provide two or more verification factors to gain access to an account or system. This SECMONS glossary entry explains how MFA works, its role in preventing credential-based attacks, and common bypass techniques attackers attempt.
Phishing — Deceptive Social Engineering to Steal Credentials and Deliver Malware
Phishing is a social engineering technique where attackers impersonate trusted entities to steal credentials, deliver malware, or gain initial access. This SECMONS glossary entry explains phishing variants, operational impact, and defensive controls.
Emotet — Modular Loader & Botnet Malware Profile
Emotet is a modular malware platform that evolved from a banking trojan into a large-scale loader and botnet ecosystem, frequently used to deliver additional payloads including ransomware. This SECMONS profile provides structured analysis of Emotet’s capabilities, targeting patterns, and defensive implications.