A cyber attack is an attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network.

Crimeware is a general term for software used to perpetrate crime, such as stealing personal identities, money or proprietary information. Crimeware can spread by way of viruses, Trojan horse programs, worms, spyware, or adware.
Compromise Assessment will tell you if you are currently compromised or if there has been past attacker activity. You will also clearly understand the extent and the severity of the compromise. Alerts are confirmed before reporting to minimize false positives.
A command-and-control [C&C] server is a computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network. Many campaigns have been found using cloud-based services, such as webmail and file-sharing services, as C&C servers to blend in with normal traffic and avoid detection.
Backdoor programs are applications that allow cybercriminals or attackers to access computers remotely. Backdoors can be installed in both software and hardware components. Many backdoor programs make use of the IRC backbone, receiving commands from common IRC chat clients.
As cyber attacks grow increasingly targeted and customized for each target, enterprises are investing in technologies that automate attack protection against targeted attacks.

The process by which sophisticated cyber attackers go through to execute a successful attack is called the attack lifecycle.

Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware infections on individual computing devices and IT systems.

Advanced persistent threat [APT] is a military term adapted into the information security context that refers to attacks carried out by nation-states. [1] APT-related threats are created by a group of developers using in-house tools that are not usually found in the cybercriminal underground.

Endpoint protection is a term often used interchangeably with endpoint security. Endpoint protection is often used to describe security solutions that address endpoint security issues, securing and protecting endpoints against zero-day exploits, attacks, and inadvertent data leakage resulting from human error.