Daemon
A Daemon is a program which is often started at the time the system boots and runs continuously without intervention from any of the users on the system. The daemon program forwards the requests to other programs (or processes) as appropriate. The term daemon is a Unix term, though many other operating systems provide support for daemons, though they're sometimes called other names. Windows, for example, refers to daemons and System Agents and services.
DanaBotDanaBot is a sophisticated, modular malware family first identified in May 2018. It began as a banking trojan but evolved into a versatile malware-as-a-service (MaaS) platform, enabling a range of cybercriminal activities including information theft, wire fraud, cryptocurrency theft, and acting as a loader for other malware families.
Key Features and Capabilities• DanaBot consists of three main components: a loader, a main module, and a set of attacker-specified modules. This modularity allows attackers to tailor the malware for specific campaigns, enabling functions such as credential theft, remote access, keylogging, screenshot capture, and system reconnaissance.
Stealth and Persistence• The malware employs advanced obfuscation techniques, including junk code, encryption (AES and RSA), Windows API hashing, and multiple layers of communication encryption, making analysis and detection challenging.• It establishes persistence through hidden files, new service creation, and DLL hijacking, particularly exploiting the Windows Update Standalone Installer (wusa.exe).
Dangling Commit
A dangling commit in Git is a commit object that exists in the repository but is not referenced by any branch, tag, or other reference. In other words, it is a commit that is not reachable from any named pointer in your repository's history.
Dangling commits can be created in several ways, such as:
Deleting a branch without merging its changes.
Force-pushing changes that overwrite existing commits.
Amending a commit (e.g., using git commit --amend), which creates a new commit and leaves the old one unreferenced.
Rebasing or other history-rewriting operations that remove references to old commits.
Although these commits are not part of any active branch or tag, they still exist in the repository until Git's garbage collection process eventually deletes them. If you know the commit's SHA-1 hash, you can still access or recover it using commands like git checkout or by creating a new branch from it.
You can list dangling commits using:
git fsck --lost-found
This will show all unreachable commits and objects in your repository.
Dark FiberDark fiber refers to unused or unlit optical fiber cables that have been installed underground or underwater for telecommunications purposes but are not currently in use. The term “dark” signifies that these fibers are not transmitting data—no light signals are passing through them, hence they are “dark”.
Dark fiber is typically leased by organizations from network service providers or telecommunications companies. Unlike traditional “lit” fiber services, where the provider manages the equipment and services, dark fiber allows the customer to install and manage their own networking equipment at both ends of the fiber. This gives the customer full control over the network’s configuration, security, and bandwidth, as well as the flexibility to scale and upgrade as needed.
Key points about dark fiber
• Control and Flexibility: Organizations can choose their own protocols, equipment, and network architecture, making dark fiber ideal for businesses with high bandwidth needs or strict security requirements.• Scalability: There is virtually no limit to the bandwidth that can be achieved, as capacity can be upgraded by changing the equipment at the endpoints.• Security: Since the fiber is dedicated and not shared with others, it offers enhanced privacy and security for sensitive data.• Cost and Responsibility: While dark fiber can be cost-effective in the long run due to fixed leasing costs and scalability, it requires a significant upfront investment in networking equipment and ongoing maintenance by the customer.
Dark fiber is commonly used by large enterprises, data centers, research institutions, and service providers who require high-speed, reliable, and secure connectivity between multiple locations.
Data Security Posture ManagementData Security Posture Management (DSPM) is a cybersecurity framework and set of technologies designed to identify, assess, and manage the security of sensitive data across an organization’s environments—whether in the cloud, on-premises, or hybrid systems.
Key Functions of DSPM
• Discovery and Classification: Automatically finds and categorizes sensitive data across all data stores, including cloud services, SaaS platforms, and on-premises environments.• Visibility: Reveals where sensitive data resides, who can access it, how it is used, and the current security posture of each data store or application.• Risk Assessment: Evaluates vulnerabilities by analyzing access controls, user privileges, and data sensitivity to prioritize remediation.• Continuous Monitoring: Provides ongoing surveillance of data activity, detecting and responding to threats or misconfigurations in real time.• Compliance Automation: Helps organizations meet regulatory requirements (e.g., GDPR, HIPAA) by automating compliance checks and generating audit-ready reports.• Remediation and Policy Enforcement: Guides or automates the fixing of security issues at their source and enforces security policies to prevent future incidents.
Why is DSPM Important?
• Prevents data breaches and reduces threat risks by proactively identifying and mitigating vulnerabilities.• Addresses the challenges of data sprawl in modern, cloud-centric, and hybrid environments.• Supports compliance with data privacy and security regulations, reducing the risk of costly violations.• Builds trust with customers and stakeholders by demonstrating a strong, proactive approach to data protection.
DDoS
A DDoS attack—short for distributed denial-of-service attack—is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic from multiple sources. Unlike a standard DoS (denial-of-service) attack, which typically originates from a single source, a DDoS attack is distributed, meaning it uses a network of compromised computers or devices (often called a botnet) to generate the malicious traffic.
During a DDoS attack, the target is bombarded with so many requests that it becomes unable to respond to legitimate users, causing service disruption or complete unavailability. The devices used in these attacks—such as computers, servers, and IoT devices—are often infected with malware and controlled remotely without their owners’ knowledge.
DDoS attacks can have severe consequences, including financial losses, reputational damage, and operational disruption for businesses and organizations. They are on the rise and require robust mitigation strategies to defend against.
DeepSeekDeepSeek is a Chinese artificial intelligence company specializing in the development of large language models (LLMs) and advanced AI-powered information retrieval and reasoning platforms. Founded in 2023 by Liang Wenfeng, a graduate of Zhejiang University and co-founder of the quantitative hedge fund High-Flyer, DeepSeek is headquartered in Hangzhou, Zhejiang.
The company made global headlines in early 2025 with the release of its DeepSeek-R1 model, a highly efficient and powerful LLM focused on logical inference, mathematical reasoning, and real-time problem-solving. DeepSeek-R1, along with other models like DeepSeek-V3, was developed at a fraction of the cost and computational resources required by leading U.S. and European AI firms. For example, DeepSeek-V3 was trained for about $5.58 million—far less than the reported $100 million cost for OpenAI’s GPT-4—and uses significantly fewer computing resources than comparable models like Meta’s Llama 3.1.
DeepSeek’s models are notable for their open-source or “open weight” approach, meaning the company shares model parameters and methods publicly, though with some usage conditions that differ from typical open-source software. This transparency, combined with competitive performance, has positioned DeepSeek as a major disruptor in the AI industry, challenging established players like OpenAI, Google, and Meta.
Key features of DeepSeek include:
• Advanced Reasoning and Search: DeepSeek combines generative AI with sophisticated reasoning and real-time, multi-source search capabilities, providing contextually rich and transparent responses.• Open-Source Models: DeepSeek’s models, such as R1 and V3, are available for free use, research, and commercial applications under open-source licenses.• Efficiency and Cost-Effectiveness: The company leverages algorithmic innovations (like mixture of experts and multi-head latent attention transformers) to achieve high performance with lower resource consumption.• Global Impact: DeepSeek’s rapid adoption and competitive capabilities have led to significant market reactions, including a notable drop in the stock prices of major U.S. tech companies.
DESDES is a widely-used method of data encryption using a private (secret) key. There are 72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that can be used. For each given message, the key is chosen at random from among this enormous number of keys. Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key.
Dictionary Attack
An attack that tries all of the phrases or words in a dictionary, trying to crack a password or key. A dictionary attack uses a predefined list of words compared to a brute force attack that tries all possible combinations.
Diffie-HellmanDiffie-Hellman, often referred to as the Diffie-Hellman key exchange or DH, is a cryptographic protocol that enables two parties to securely establish a shared secret key over a public channel, even if they have no prior knowledge of each other. This shared key can then be used for symmetric encryption, allowing for secure communication between the parties.
The core idea is that both participants—commonly called Alice and Bob—agree on two public values: a large prime number and a base (generator) . Each party then chooses a private, secret number (their private key), computes a corresponding public value, and exchanges these public values over the insecure channel. Using their own private key and the other party’s public value, both can independently compute the same shared secret, which is mathematically infeasible for an eavesdropper to determine, even if they see all the public information exchanged.
Digital Certificate
A digital certificate is an electronic document or file that proves the authenticity of a user, device, server, or website using cryptography and public key infrastructure (PKI). It acts like a digital ID card, binding a public key to the identity of its owner and allowing secure, trusted communication over networks such as the internet.
Digital certificates verify the identity of the certificate holder (such as a website, user, or device) to others, ensuring that the entity is genuine and trustworthy. They enable secure, encrypted communication by providing a public key that can be used to encrypt data, which only the holder of the corresponding private key can decrypt. Certificates are digitally signed by a Certificate Authority (CA), a trusted third party that validates the information and vouches for the certificate’s authenticity.
Distribution as a ServiceDistribution as a Service (DaaS) in the context of cyberattacks refers to a model where cybercriminals outsource the distribution of malicious software or cyberattack tools to third-party providers. This approach enables attackers to focus on their core activities, such as developing malware or orchestrating campaigns, while leveraging specialized infrastructure and expertise for distributing their malicious payloads.
How DaaS Facilitates Large-Scale Cyberattacks
Lowered Barriers to Entry: DaaS makes sophisticated attack tools and services accessible to less-skilled individuals by providing ready-made solutions, such as malware, ransomware, phishing kits, and DDoS tools. This significantly broadens the pool of potential attackers and increases the volume of attacks.
Scalability: Attackers can scale their operations easily, from targeting a few individuals to launching massive, coordinated campaigns against thousands or millions of victims. DaaS platforms often offer tiered pricing or subscription models, allowing attackers to adjust their reach based on their goals and budget.
Anonymity: Many DaaS providers operate on the dark web, protecting both the service provider and the buyer from identification and law enforcement. This anonymity encourages more widespread use of these services.
Comprehensive Offerings: DaaS providers may bundle various attack tools, such as:
Ransomware-as-a-Service (RaaS): Ready-to-deploy ransomware packages with support and infrastructure.
Malware-as-a-Service (MaaS): Modular malware platforms for customized attacks.
DDoS-as-a-Service: Tools for launching distributed denial-of-service attacks.
Phishing-as-a-Service (PhaaS): Pre-made phishing kits with templates and credential-capture tools.
By outsourcing distribution to specialized providers, cybercriminals can execute large-scale, sophisticated attacks with minimal technical expertise or infrastructure investment. This model has contributed to the rapid growth and professionalization of the cybercrime ecosystem.
DLL SideloadingDLL sideloading is a technique used in Windows environments where attackers exploit the way the operating system searches for and loads Dynamic Link Libraries (DLLs), which are files containing code and data used by multiple applications.
When an application needs to load a DLL, Windows follows a specific search order to locate the required file. This order typically starts with the directory from which the application was loaded, then checks system directories, the Windows directory, and finally directories listed in the PATH environment variable. If the application does not specify the full path to the DLL it needs, or if the manifest file (which describes dependencies and configuration) is not explicit enough, Windows may load a malicious DLL placed in a directory that is checked before the legitimate one.
Attackers take advantage of this behavior by placing a malicious DLL with the same name as a legitimate one in a location where it will be found and loaded first, such as the application’s own directory. When the application is launched, it inadvertently loads the malicious DLL instead of the intended one, allowing the attacker to execute arbitrary code—often with the privileges of the trusted application. This technique is commonly used for persistence, privilege escalation, and evading detection by security solutions, as malicious activity appears to originate from a legitimate, signed process.
DLL sideloading is closely related to DLL hijacking, but in sideloading, the attacker typically distributes both a legitimate application and the malicious DLL together, whereas in hijacking, the attacker may target libraries already present on the victim’s system. Both techniques are widely used by advanced threat actors and malware operators to bypass security controls and maintain access to compromised systems.
DMZ
A DMZ (demilitarized zone) in cybersecurity is a specially configured subnetwork that sits between an organization’s internal network and an untrusted external network, typically the internet, to provide an additional layer of security. The DMZ acts as a buffer, isolating public-facing services—such as web, email, and FTP servers—from the internal network where sensitive data resides.
Key features of a DMZ
• Segmentation: The DMZ separates external-facing servers from internal resources. Only the services exposed in the DMZ are accessible from the internet, while the internal network remains protected behind firewalls.• Controlled Access: Traffic between the internet and the DMZ, as well as between the DMZ and the internal network, is tightly controlled and filtered by security gateways, typically firewalls.• Risk Reduction: If a server in the DMZ is compromised, attackers still face additional security barriers before reaching the internal network, minimizing potential damage.• Common Use Cases: Hosting web servers, mail servers, FTP servers, DNS servers, and proxy servers that need to be accessible from the internet but should not have direct access to sensitive internal data.
Purpose and Benefits
• Enhanced Security: Adds a critical layer of defense by ensuring that external entities cannot directly access sensitive internal systems.• Compliance: Helps organizations meet regulatory requirements by limiting exposure and centralizing monitoring of externally accessible services.• Damage Limitation: Reduces the risk and impact of successful attacks by containing them within the DMZ.
Architecture
A typical DMZ is positioned between two firewalls: one separating the internet from the DMZ, and another separating the DMZ from the internal network. This setup ensures that incoming traffic is scrutinized before reaching internal assets
DNS
DNS stands for Domain Name System. It is a foundational technology of the Internet that translates human-friendly domain names (like www.example.com) into machine-readable IP addresses (such as 192.0.2.1).
How DNS Works
• When you type a domain name into your web browser, DNS servers translate that name into the corresponding IP address needed to locate and connect to the correct web server.• This process is similar to how a phonebook or a contact list matches names to phone numbers, making it easier for users to access websites without memorizing complex numerical addresses.
Why DNS Matters
• Every device on the Internet has a unique IP address, but remembering these numbers is impractical for users. DNS allows people to use easy-to-remember domain names instead.• DNS is hierarchical and distributed, meaning it is managed by a network of servers worldwide, ensuring reliability and scalability as the Internet grows.• It is essential for accessing websites, sending emails, and virtually all other online activities that require domain name resolution.
Key Functions
• Name Resolution: Converts domain names to IP addresses so browsers can load Internet resources.• Distributed Management: DNS is structured so that different organizations can manage their own domains, with the system delegating authority for each subdomain.• Performance and Flexibility: DNS can direct users to the nearest or fastest server, which is crucial for content delivery networks and cloud services.
Domain
A domain in networking refers to a logical grouping of computers, devices, users, and resources that are organized and managed under a single administrative framework. This structure allows centralized management of network policies, security, authentication, and resource access.
A server (or servers) called a domain controller manages the domain. It authenticates users, enforces policies, and manages directory information such as user accounts and security groups. Users log in using domain credentials, which allows them to access authorized resources from any device within the domain, not just their personal workstation. Large organizations may use multiple domains connected by trust relationships, enabling secure resource sharing across different parts of the organization.
Domain hijackingDomain hijacking, also known as domain theft, is the act of gaining unauthorized control over a domain name without the consent of its legitimate owner. This typically involves changing the domain’s registration details, DNS records, or transferring the domain to another registrar, effectively locking out the original owner and granting the attacker full control of the domain and all its associated services.
Domain hijacking can occur through several methods, often exploiting technical vulnerabilities or human error. With Social Engineering, attackers use deception—such as phishing emails, fake phone calls, or fraudulent websites—to trick domain administrators or registrar support staff into revealing login credentials or authorizing changes to domain registration details. With Credential Compromise, attackers obtain the username and password for the domain registrar account—often through phishing, malware, or data breaches. A domain may be hijacked through Email Account Takeover since most domain registrars use email verification for account changes. Via Exploiting Registrar or DNS Vulnerabilities, attackers may exploit software vulnerabilities in the registrar’s systems or DNS infrastructure to gain unauthorized access to domain management functions. Finally, through Forged Transfers, attackers may initiate unauthorized domain transfers by impersonating the legitimate owner or exploiting weaknesses in registrar transfer procedures.
DoublePulsarDoublePulsar is a stealthy kernel-mode backdoor implant developed by the NSA’s Equation Group, leaked by Shadow Brokers in 2017. Its installation communication involves a multi-stage process exploiting SMB protocol vulnerabilities (e.g., via EternalBlue), followed by covert command-and-control (C2) traffic masquerading as standard SMB errors.
Installation and Communication Mechanism
Initial Exploitation
The backdoor is installed through SMB exploits (e.g., EternalBlue leveraging CVE-2017-0143). After compromising the system, DoublePulsar injects kernel shellcode to establish persistence.
Post-Installation C2 Protocol
Once active, DoublePulsar communicates using custom SMB extensions.
Commands are hidden in standard SMB fields
Timeout field encodes commands (e.g., 0x23 = ping, 0xc8 = execute, 0x77 = kill). Multiplex ID in responses indicates status (e.g., incremented by 0x10 for success). Signature field contains an XOR key for payload encryption.
Stealthy Transaction Structure
Uses SMB_COM_TRANSACTION2 with the unimplemented subcommand TRANS2_SESSION_SETUP (0x000E). Infected hosts respond with STATUS_NOT_IMPLEMENTED but modify the Multiplex ID (e.g., 0x81 instead of 0x65).
Payload Delivery
For “execute” commands, payloads (e.g., malware) are encrypted with a dynamic XOR key derived from the SMB signature. Encrypted data is sent within SMB session parameters, bypassing signature-based detection.
Detection Indicators
Network Traffic
Look for SMB responses with Multiplex ID = 0x81 or unexpected STATUS_NOT_IMPLEMENTED to TRANS2_SESSION_SETUP requests.
Behavioral Signs
Null sub_command values in SMB traffic or anomalous Multiplex ID increments.
Mitigation
Patch SMB vulnerabilities (e.g., MS17-010).
Block anomalous SMB transactions (e.g., unexpected SESSION_SETUP subcommands).
Use tools like Nessus (plugin ID 99439) for active scanning.
DoublePulsar’s design evades detection by mimicking benign SMB errors, making it critical to monitor protocol anomalies rather than payload content.