Skip to content

Daily Cyber Alert – Discover the latest in cyber threat news directly from the Silobreaker platform Learn More +

  • Request demo
Menu
  • Request demo
  • Product
        • Platform
          • Cyber Threat Intelligence Platform
          • Physical Risk Intelligence
          • Silobreaker Conflict and Geopolitical Risk Intelligence
          • Brand Threat Protection
        • Industries
          • Financial Services
          • Tech & Telecoms
          • Government & Defence
          • Critical Infrastructure
          • Service Providers
          • Healthcare & Pharma
  • Alerts
    • Financial Services Threat Alert
    • Ransomware Rewind
    • Russia-Ukraine Insights Alert​
    • Daily Cyber Alert
    • US Politics Media Watch​
    • Weekly Cyber Digest
    • COVID-19 Threat Alert​
  • Resources
    • Events
    • Webinars
    • Customer Stories
  • Partners
    • Integration Partners
    • Channel Partners
  • Company
    • About
    • News
    • Careers
    • Contact
  • Free Trial
  • Login

Glossary

Account Takeover Fraud

Account takeover fraud is when cybercriminals use stolen login credentials to access a user’s bank accounts, credit cards, online shopping accounts and more. Account takeover fraud is a form of identity theft and fraudsters use tools like phishing and malware to take control of accounts and do things like make unauthorised transactions, change account information or steal sensitive data.

Botnet

A botnet (short for “robot” and “network”) refers to a network of hacked computer devices controlled by an attacker, or ‘botmaster’. Botnets are usually created by infecting devices with malware, which allows the botmaster to remotely control these devices and carry out DDoS (Distributed Denial of Service) attacks, send spam emails, steal personal information or spread more malware. Botnets allow cybercriminals to carry out large-scale attacks and can even be rented out to other cybercriminals.

Brand Abuse

Brand abuse is the unauthorised use of a company’s brand or trademark with the intent to mislead its customers. Brand abuse examples include false advertising, counterfeiting, trademark infringement, imitation websites and social media impersonation. A company’s reputation and financial performance can be seriously damaged by brand abuse.

Brand Intelligence

Brand intelligence is knowledge gained from collecting and analysing data about consumers in order to understand their feelings and behaviour towards a brand. Sources of strategic brand intelligence include online mentions in blogs and the news, social media interactions and customer feedback. Brand intelligence is used to change or improve a brand’s image and understand and respond to what consumers want and need.

Brand Threat Protection

Brand protection is the process and tools an organisation uses to protect its brand and reputation, such as defending against trademark infringement, counterfeit goods, and unauthorised use of the brand online. Online brand protection includes monitoring social media channels, websites, and other online platforms for negative mentions, fake accounts, and other forms of brand impersonation or infringement, and removing it.

Learn More
Business Email Compromise

Business email compromise (BEC) is a type of cyber attack where attackers gain access to a business email account, using it to impersonate someone and trick people or other organisations into taking harmful actions. One type of business email compromise attack is CEO fraud, where attackers pose as the CEO or another executive to obtain fraudulent wire transfers, financial information or login credentials.

CEO Fraud

CEO fraud (or Business Email Compromise) is a scam where cybercriminals send convincing emails posing as company executives to trick an employee – usually in finance or HR – into conducting unauthorised wire transfers or providing confidential information. CEO fraud is also known as whaling CEO fraud, and authentic-looking emails are sent that emphasise urgency and confidentiality to encourage employees to take action without verification. A CEO fraud attack is a highly targeted form of spear-phishing, where attackers send emails that appear to be from a known or trusted sender.

Computer Emergency Response Team (CERT)

A computer emergency response team (CERT) is a group of cybersecurity experts who prevent, detect and respond to cybersecurity incidents, like data breaches and denial-of-service attacks. Computer emergency response team roles and responsibilities include providing alerts and incident handling guidelines and helping to develop best practices for information security. Many large organisations and government agencies have their own internal CERT teams, such as the US Department of Defense computer emergency response team.

Credential Stuffing

Credential stuffing is when hackers use stolen or leaked usernames and passwords from one online account to try to break into others. Many people reuse usernames and passwords across multiple services, so attackers use automated bots to try to gain access to different accounts with the stolen logins. In a credential stuffing attack, once an account is compromised, attackers can steal sensitive data and carry out other malicious activities.

Cyber Fusion Centre

A Cyber Fusion Centre (CFC) is designed to promote collaboration between teams responsible for IT and cybersecurity functions in order to give organisations a more complete view of their overall security posture. A CFC enables an organisation to be more proactive and effective in tackling threats by bringing together information that highlights vulnerabilities and enhances their understanding of the risks they face.

Cyber Threat Intelligence

Cyber threat intelligence is information gathered from a range of sources about current or potential attacks against an organisation.

Learn More
Dark Web

The dark web is a part of the internet that isn’t indexed by search engines and can only be accessed using specialised software, such as the Tor browser. It is often associated with illegal or unethical activities, including malicious hacking and fraud, as well as the sale of drugs, weapons, and other illegal items and services. It is also used for legitimate purposes, like communication by journalists and activists in censored countries, and for anonymous sharing of information.

DDOS Attack

A DDoS attack (distributed denial of service) is a type of cyber attack that disrupts a website or online service and makes it inaccessible for legitimate users. In a distributed denial of service attack, cybercriminals overwhelm the targeted server with such a high volume of traffic that the site slows down considerably or crashes. DDoS attacks are different from denial of service attacks because they originate from multiple compromised computers and online devices. Motives for DDoS attacks include extortion, revenge, political activism or distracting from other more damaging attacks.

Deep Web

The deep web is the part of the internet that is not searchable using search engines like Google and Bing. The deep web is not indexed, and contains content like paywalled websites, private databases and the dark web. The dark web, known for illegal activities, is only a small part of the deep web. The majority of deep web content is noncriminal, such as private email, chat messages and social media messages, and electronic bank and health records.

DNS Spoofing

DNS spoofing is a technique that cybercriminals use to carry out a pharming attack to redirect legitimate web traffic to a fake site for malicious purposes, like stealing sensitive data. Usually, when a user types in a website’s address, their computer sends a request to a DNS (Domain Name System) server to translate it into an IP address that opens the requested website or page. In a DNS spoofing attack, the DNS request is intercepted and a fake IP address is sent back that leads to a fake website.

Email Spoofing

Email spoofing is the practice of sending email messages from a forged sender’s address. A spoofed email is used by malicious actors to trick recipients into clicking malicious links, opening infected attachments, sharing sensitive data and even wiring money. A phishing email is a type of spoof email, when it uses a forged sender’s address.

Extended Detection and Response (XDR)

Extended detection and response (XDR) is a solution that connects various security data – including an organisation’s endpoints, network analysis and visibility (NAV), email security, identity and access management, cloud security, and more – in order to optimise threat detection, investigation, response, and hunting in real time. XDR security solutions evolved from EDR (endpoint detection and response), which only focuses on endpoint data.

Finished intelligence

Finished intelligence is generated by collecting, processing and analysing raw data from various sources in order to provide actionable information. Organisations use finished cyber security intelligence to understand complex threats and take proactive steps to mitigate risk.

Geopolitical Intelligence

Geopolitical intelligence is meaningful information generated from analysing data about political, social, and economic events and trends around the world. This includes data about trade relations, supply chains, sanctions, public health issues, political conflict and cyberattacks. Geopolitical intelligence helps organisations understand and manage political threats that impact the locations where they operate or hold assets.

Geopolitics

Geopolitics refers to the geographical, political and economic factors that shape international relations and world events. In the field of geopolitics, analysts study the people, organisations and governments that carry out political, economic and financial activities, and how their actions affect other nations in terms of security, trade and diplomacy. The study of geopolitical events, such as global instability, conflicts, trade disputes or natural disasters, can be used to assess risks and opportunities regarding security, economic stability and investments.

Identity Fraud

Identity fraud is the use of stolen personal, private or financial information for unlawful gain. Examples of what is considered identity fraud include using a stolen identity to open new credit accounts, withdraw money from bank accounts, or commit crimes. Phishing (fraudulent emails) and malware (malicious softwared) are digital methods that criminals use to steal the sensitive information needed to commit identity fraud. Comparing identity theft vs fraud, identity theft is when criminals steal someone’s personal information, but identify fraud is how they use it for illegal purposes.

Impersonation Attack

An impersonation attack is a type of fraud where an attacker pretends to be a known or trusted person in order to steal sensitive information or trick someone into transferring money. The most common impersonation attack types include phishing, a form of email impersonation attack where attackers pose as banks or legitimate organisations to obtain credit card numbers or login credentials.

Incident Response Team

An incident response team (IRT) is a group that is responsible for managing a variety of security incidents that can affect an organisation’s IT systems, data and operations. Examples include data breaches and cyber-attacks, as well as natural disasters, human error and harm to physical equipment. The typical Incident response team structure consists of team members with different technical skills and functions – like cybersecurity, legal and corporate communications – to be prepared for a wide range of security incidents and minimise their impact.

Indicators of Attack

Indicators of attack (IOA) are signs of a cyber attack against an organisation’s systems or network. An important difference between an indicator of attack vs indicator of compromise is that an IOA focuses on identifying a cyber attack that is in progress, but an indicator of compromise relates to evidence that systems have already been compromised, such as discovering malware or the unauthorised transfer of data. Examples of IOAs include unusual network traffic and failed login attempts.

Indicators of Compromise
Information Sharing and Analysis Centres

An Information Sharing and Analysis Centre (ISAC) is a non-profit organisation that gathers information and analysis on cyber threats, including threats to critical infrastructure. ISACs enable two-way sharing of information between the private and public sectors, helping improve an organisation’s overall security posture by providing timely and relevant information.

Insider Threat

An insider threat is the risk of a cybersecurity breach that comes from an organisation’s ‘insiders’ – such as their employees, partners or suppliers. There are different types of insider threat, including intentional insider threats, such as when an employee uses their legitimate access to steal sensitive data or harm the organisation’s systems, or they can be unintentional, such as when an employee accidentally shares sensitive information or unknowingly introduces malware into the system.

Intelligence Requirements (IRs)

Intelligence requirements (IRs) refer to the information an organisation needs from its threat intelligence team to protect it from cyber threats. Intelligence requirement examples include information about overall cyber risks to an organisation and its industry. IRs are more general and less operationally-focused than Priority Intelligence Requirements, which are more detailed and answer an organisation’s most critical cyber threat questions.

Machine Learning

Machine learning (ML) is a type of artificial intelligence (AI) that involves teaching machines to learn from data and improve without being programmed by a human. Machine learning uses large volumes of data and algorithms to identify patterns, develop, adapt and produce insights. In cybersecurity, machine learning is used to spot patterns that help organisations detect future attacks. Other examples of machine learning include financial trading, facial recognition and DNA sequencing.

Malware

Malware (short for “malicious software”) is computer software designed to damage, disrupt or gain unauthorised access to a computer system or network. Types of malware include viruses, worms, trojan horses, ransomware and spyware. In a malware attack, cybercriminals use email attachments, malicious websites, social engineering or software vulnerabilities to infect a computer system with malware. Malware can be used to steal sensitive information, take control of a system or deny system access until a ransom is paid (known as ransomware).

Man in the Middle Attack

A man in the middle attack refers to a cyber attack where a perpetrator intercepts an existing conversation between two parties in order to eavesdrop, impersonate one of the parties or capture data that is being transmitted. Man in the middle attacks can occur through compromised Wi-Fi networks, phishing attacks or malware infections and can lead to data breaches, financial loss and damage to reputation.

MITRE Att&ck Framework

The MITRE ATT&CK Framework documents the tactics, techniques and procedures used by threat actors in real-world cyber attacks. ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge, and this knowledge base helps organisations understand the methods used by attackers to understand the threat landscape better and improve their defences against cyber threats. This framework is used by security professionals and organisations worldwide.

Open Source Security Intelligence | OSINT

OSINT, or open source intelligence, refers to insights gathered from data that is publicly available and accessible by anyone. This includes news, articles, social media posts, and blog posts, as well as data that is collected and openly shared by people or organisations. Organisations use OSINT to guide decision making and assess threats, including cybersecurity risks.

Operational Intelligence

Operational intelligence, or operational threat intelligence, is information gained from analysing details of known attacks, providing insight into specific attacks and their nature, intent and timing. Operational intelligence requires a strong technical background and is mostly used by security teams and incident responders. It helps security teams contextualise and prioritise risks and block attacks before they occur.

Paste Sites

Paste sites, also known as pastebins or pasting sites, are websites that give users the ability to create and share plain text documents through public posts called ‘pastes’. Paste sites are largely used for legitimate purposes, such as sharing and reviewing computer code, but it is also used to share leaked or stolen data. Paste sites allow people to share large text files without a user registration, and as a result are popular with hackers.

Penetration Testing

Penetration testing, or pen testing, is a simulated cyber attack on a system or network used to identify possible vulnerabilities. A typical penetration test uses techniques like social engineering network scanning and application testing to find weaknesses in security controls. Cyber security penetration testing provides organisations with insights they can use to manage vulnerabilities and improve their security.

Personally Identifiable Information

Personally identifiable information (PII) is any information that can be used to identify a person. Examples of personally identifiable information include an individual’s name, driver’s license number, date of birth, email address, phone number or home address. Cybercriminals use stolen personally identifying information to commit identity fraud for financial gain and other illegal activities. PII is subject to data privacy laws, such as the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

Pharming

Pharming is a type of online fraud where attackers use of malicious code to redirect victims to fake websites in order to steal their credentials and data. Normally, a user types in a web address and their computer sends a request to a server that sends back the correct web page. In a pharming attack, cybercriminals redirect the web traffic to a fake website that looks almost identical to the real one. DNS spoofing and malware-based pharming are two techniques used to carry out a pharming attack.

Phishing

Phishing is when cybercriminals send emails designed to trick people into clicking a malicious link or disclosing sensitive information, like passwords or account information. Phishing is an example of social engineering, and is effective because it uses human nature (like trust, fear or curiosity) to trick people. Phishing attacks can result in identity theft and financial loss. Vishing (phishing phone calls) and smishing (phishing SMS messages) are types of phishing attacks.

Physical Security Intelligence

Physical security intelligence is key information about situations and events that could potentially cause physical harm to an organisation and its people, buildings, or assets. Examples of physical threats include natural disasters and accidental damage, as well as vandalism, protests, theft and terrorism.

Learn More
Priority Intelligence Requirements (PIRs)

Priority intelligence requirements (PIRs) refer to information that is critical to an organisation’s goals. Cyber priority intelligence requirements examples include information about threat actors targeting an organisation’s critical assets or identifying threat actors’ motives or goals. PIRs are more detailed and operationally focused and prioritise an organisation’s more general Intelligence Requirements (IRs) so that threat analysts know where to focus their time and effort.

Ransomware

Ransomware is a type of malware (malicious software) that cybercriminals use to block access to data or a computer system until a ransom has been paid. In ransomware attacks, the victim’s data is encrypted so that they can’t access files, databases or applications without the right ‘key’ to decrypt them. It’s nearly impossible to decrypt the files that are being held for ransom without the key. Ransomware is typically spread through phishing (fraudulent emails) or malicious software downloads.

Remote Code Execution

Remote code execution (RCE) is a cyber security vulnerability that allows an attacker to run malicious code or commands on a target system from a remote location, using public or private networks. In a remote code execution attack, an attacker can gain full control over a compromised machine, steal data, deploy ransomware, disrupt service and more.

Reputational Damage

Reputational damage is the harm done to an organisation’s reputation due to ethical, safety, product-quality or employee issues, as well as data leaks and cyber attacks. Damage to reputation can result in lost revenue, increased costs, decreased shareholder value and loss of trust or confidence from customers, partners and other stakeholders.

SecOps Intelligence

SecOps intelligence is key information gained from security research, threat intelligence platforms and open sources about potential cyber threats and vulnerabilities. SecOps intelligence helps secops teams understand risk, including new and emerging threats, threat actors, malware, compromise indicators and vulnerabilities. This information is used to develop strategies to prevent, detect and respond to security incidents.

Security Information and Event Managment (SIEM)

Security information and event management (SIEM) is a security solution that helps organisations detect, analyse, and respond to security threats. A SIEM solution collects, monitors, stores and analyses security-related data from multiple sources like servers, endpoint devices and applications. The data is then used to identify, investigate and prioritise cyber security attacks and breaches

Security Operations (SecOps)

Security operations (SecOps) is the combination of IT security and IT operations into a team that enables organisations to reduce risk and strengthen cyber security. This collaboration ensures an organisation is incorporating security considerations into IT operations as early as possible, and can meet its cyber security objectives without compromising on IT performance. SecOps often operates from a cyber security operations centre (SOC).

Shadow IT

Shadow IT is the use of digital devices, software, applications, and services without the approval of the IT department. Shadow IT problems can occur when employees use unauthorised personal devices or cloud-based applications to do work-related tasks, bypassing official company channels and creating security risks that can result in breaches, compliance violations, and more.

Smishing

Smishing is a form of phishing (an online scam using fraudulent emails), where SMSs or text messages are used to trick recipients into clicking on malicious links or disclosing sensitive information. Senders of smishing messages pose as legitimate organisations, using urgent language or authentic-looking offers. Smishing is often highly convincing because people are more likely to trust a message that comes from a messaging app on their phone than from a message delivered via email.

SOAR

SOAR (Security Orchestration, Automation and Response) is a cybersecurity solution that combines different security tools to streamline cybersecurity in three key areas – threat and vulnerability management, incident response and security operations automation. Soar cyber security integrates security, IT operations and threat intelligence tools – even tools from different vendors – for a more coordinated approach that can lead to faster response times, better threat detection and an overall improvement in cybersecurity.

Social Engineering

Social engineering is a technique used by cybercriminals that exploits human nature (trust, fear or curiosity) to get sensitive information, access to systems or financial benefit. Phishing, smishing and vishing are types of social engineering, and these fraudulent email, SMS or voice messages are designed to lure users into sharing information or clicking on a malicious link. Social engineering attacks are often effective because the messages appear to come from a legitimate company or person, and seem urgent or beneficial.

Specific Intelligence Requirements (SIRs)

Specific Intelligence Requirements (SIRs) are a sub-type of intelligence requirement that provides the more detailed information needed to address specific questions or issues. As compared to Priority Intelligence Requirements (PIRs), which are higher level, SIRs may be set by analysts or others involved in the intelligence collection process to meet the PIRs of senior decision makers. SIRs tend to be more tactical and technical, with a focus on facts, entities or activities.

STIX/TAXII

STIX TAXII (Structured Threat Information eXpression and Trusted Automated eXchange of Indicator Information) are cybersecurity standards developed to improve defence strategies against cyber attacks. Comparing stix vs taxi, stix is the cyber threat information component, while taxii is how that information is relayed, e.g., via services and message exchanges. Stix/taxii are an open-sharing and community-driven effort, and unlike previous methods of collaboration, they are machine-readable and easily automated.

Strategic-Political Intelligence

Strategic intelligence provides a long-term view of the risks that could impact an organisation. Strategic cyber intelligence enables organisations to understand the financial and reputational consequences of cyber threats, and covers a wide range of information, including technical, political and social, gathered from multiple sources. Strategic threat intelligence helps organisations make key decisions, allocate resources and strengthen their security.

Learn More
Supply Chain Attack

A supply chain attack, or third-party attack, is when cybercriminals attack a less secure supplier in group of organisations that work together in order to gain access to a larger target’s network. In cybersecurity supply chain attacks, criminals exploit weaknesses in third-party systems and use them to compromise other organisations in the supply chain. This means that even if an organisation has strong cybersecurity measures in place, they can still be vulnerable if a third-party supplier or partner is compromised.

Tactical Intelligence

Tactical intelligence is information about the tactics, techniques and procedures (TTPs) of cyber criminals. It helps security teams understand the capabilities and goals of attackers, along with their methods. Tactical intelligence enables organisations to detect and respond to cyberattacks and develop more effective defensive strategies to prevent similar attacks in the future.

Third-Party Risk

Third party risk is the potential for an organisation to suffer a data breach or other cyber attack as a result of third-party vendors, suppliers or partners that have access to their systems or data. Third party risks occur when a third-party doesn’t have the necessary security measures in place to defend against cyber threats, providing an easier way for threat actors to attack even the most sophisticated of security systems.

Threat Actor

A threat actor is a person or group that intentionally causes harm in the online world. Cyber threat actors look for weaknesses in computers, networks and systems to carry out attacks on people and or organisations. There are various types of threat actors, with different motivations ranging from data theft and financial gain, to disrupting the operations of an organisation or even a country. Threat actors in cybersecurity use tactics like phishing attacks, ransomware and malware.

Threat Hunting Team

A threat hunting team is a group of cyber security professionals who identify security incidents that may go undetected by automated security tools such as malware detectors and firewalls. Instead of waiting for potential threats to surface, a dedicated threat hunting team proactively searches an organisation’s IT environment to detect potential threats and respond to them before they can cause damage or disruption to the organisation.

Threat Intelligence Lifecycle

The threat intelligence lifecycle is a continuous process that organisations go through to identify potential cyber threats. There are six phases of the threat intelligence lifecycle, including planning, data collection, processing, analysis, dissemination and feedback. This security intelligence lifecycle provides organisations with the intelligence they need to proactively manage security risks.

Threat Intelligence Platform

A threat intelligence platform (TIP) is a software tool that helps security teams collect, sort and analyse threat intelligence data to protect their organisation from cyber threats. TIPs usually collect data from a variety of sources, including internal security tools and the internet, and sometimes even the deep and dark web. Threat intelligence solutions provide security teams with a comprehensive view of potential threats to their organisation’s IT infrastructure, and helps them identify and respond more quickly and effectively.

Trademark Monitoring

Trademark monitoring involves keeping track of how a specific trademark is being used by third parties. This is done to ensure a trademark owner is aware of any potential misuse or weakening of their brand name, so that legal action can be taken when needed. Misuses can include trademark infringement, false advertising, counterfeiting, imitation websites, phishing emails and social media impersonation. International trademark monitoring tracks the use of a trademark globally, detecting any potential abuse in different regions.

Unstructured Data

Unstructured data is a type of data that has no particular format and is not organised or easily searchable the way that traditional structured data bases are. Unstructured data is often found in natural language and includes written content on news sites and blogs, messaging platforms and social media posts, as well as audio files, images and videos. Unstructured data is harder to categorise and analyse than structured data, but with data analytics tools, it can be analysed and utilised by organisations for improved decision-making.

Vishing

Vishing, or voice phishing, refers to criminals leaving voice messages or making phone calls to trick people into giving up sensitive information. In vishing attacks, the caller pretends to be calling from the likes of the government, tax department, police or the target’s bank, and uses threats and forceful language to convince victims to provide sensitive data. Vishing, phishing (fraudulent emails) and smishing (fraudulent text messages) all have the same goal – obtaining information from users that can be used for identity theft, financial gain or account takeover.

Vulnerability Analysis

Vulnerability analysis is the process of finding and assessing gaps or weaknesses within an organisation’s computer network or system that could be exploited by cyber criminals. Vulnerability analysis typically includes identifying, evaluating and prioritising these vulnerabilities, to determine security risks and to develop strategies to mitigate or eliminate these risks.

Vulnerability Scanning

Vulnerability scanning is the process of using software programmes to find and resolve possible security weaknesses in computer systems, networks or applications. Scanning tools usually look for known vulnerabilities, such as outdated software or security flaws. There are many methods for scanning vulnerabilities, including network-based scanning and application-based scanning. This scan is also performed by attackers who try to find points of entry into targeted networks.

Watering Hole Attack

A watering hole attack in cybersecurity is an attack that targets a group of users by infecting websites that they commonly visit with malware. Similar to a watering hole where animals come to drink and are targeted by predators, in a watering hole cyber attack, malware is downloaded onto members’ computers when they visit the compromised website, allowing the attacker to access their organisation’s network and carry out malicious activities.

Whaling

Whaling is a type of phishing attack (an online scam using fraudulent emails) that specifically targets C-suite and high-level executives. Whaling phishing attacks target senior executives with messages designed to trick them into sharing sensitive information or transferring funds. In a whaling attack, the fraudulent emails are more sophisticated than typical phishing emails – often containing personalised information about the targeted organisation or person and written in polished business language.

Get started today

Ready to try it for yourself? Request a demo of Silobreaker today.

Request demo
Silobreaker
Linkedin-in Twitter Facebook-f

Product

  • Platform
  • Industries
  • Platform
  • Industries

Log in

Resources

  • Alerts
  • Webinars
  • Glossary
  • Alerts
  • Webinars
  • Glossary

Partners

  • Integration Partners
  • Channel Partners
  • Integration Partners
  • Channel Partners

Company

  • About Silobreaker
  • News
  • Careers
  • Services
  • Legal
  • Privacy Policy
  • About Silobreaker
  • News
  • Careers
  • Services
  • Legal
  • Privacy Policy

Contact

  • Sales
  • Support
  • Offices
  • Sales
  • Support
  • Offices
Copyright © 2023 by Silobreaker Limited. All rights reserved.
Manage consent
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
__hssrcsessionThis cookie is set by Hubspot whenever it changes the session cookie. The __hssrc cookie set to 1 indicates that the user has restarted the browser, and if the cookie does not exist, it is assumed to be a new session.
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
elementorneverThis cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
__cf_bm30 minutesThis cookie, set by Cloudflare, is used to support Cloudflare Bot Management.
__hssc30 minutesHubSpot sets this cookie to keep track of sessions and to determine if HubSpot should increment the session number and timestamps in the __hstc cookie.
bcookie1 yearLinkedIn sets this cookie from LinkedIn share buttons and ad tags to recognize browser ID.
bscookie1 yearLinkedIn sets this cookie to store performed actions on the website.
langsessionLinkedIn sets this cookie to remember a user's language setting.
lidc1 dayLinkedIn sets the lidc cookie to facilitate data center selection.
UserMatchHistory1 monthLinkedIn sets this cookie for LinkedIn Ads ID syncing.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
CookieDurationDescription
_uetsid1 dayBing Ads sets this cookie to engage with a user that has previously visited the website.
_uetvid1 year 24 daysBing Ads sets this cookie to engage with a user that has previously visited the website.
SRM_B1 year 24 daysUsed by Microsoft Advertising as a unique ID for visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
__hstc5 months 27 daysThis is the main cookie set by Hubspot, for tracking visitors. It contains the domain, initial timestamp (first visit), last timestamp (last visit), current timestamp (this visit), and session number (increments for each subsequent session).
_ga2 yearsThe _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_gat_gtag_UA_1737047_91 minuteSet by Google to distinguish users.
_gcl_au3 monthsProvided by Google Tag Manager to experiment advertisement efficiency of websites using their services.
_gid1 dayInstalled by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
hubspotutk5 months 27 daysHubSpot sets this cookie to keep track of the visitors to the website. This cookie is passed to HubSpot on form submission and used when deduplicating contacts.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
ANONCHK10 minutesThe ANONCHK cookie, set by Bing, is used to store a user's session ID and also verify the clicks from ads on the Bing search engine. The cookie helps in reporting and personalization as well.
MUID1 year 24 daysBing sets this cookie to recognize unique web browsers visiting Microsoft sites. This cookie is used for advertising, site analytics, and other operations.
test_cookie15 minutesThe test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
_clck1 yearNo description
_clsk1 dayNo description
AnalyticsSyncHistory1 monthNo description
CLID1 yearNo description
li_gc5 months 27 daysNo description
SMsessionNo description available.
SAVE & ACCEPT
Powered by CookieYes Logo