In cybersecurity, this is the term used to describe a site (or server) being abused by a threat actor without the owner’s knowledge for their own nefarious purposes, e.g., to house and spread malware or to be used as a C2. Sometimes, threat actors set up phishing and fraudulent sites on these compromised locations.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language