Glossary
Cybersecurity & Threat Intelligence Terms
Definitions for technical terms used across the vspam.org platform, research publications, and API documentation. Terms are cross-referenced where related concepts exist.
A
- APWG
- Anti-Phishing Working Group. An international coalition of industry, government, and law enforcement agencies focused on unifying the global response to cybercrime, particularly phishing.See also: Phishing
B
- BEC
- Business Email Compromise. A type of social engineering attack where an attacker impersonates a trusted business contact (CEO, vendor, partner) to trick victims into transferring funds or revealing sensitive information.See also: Phishing
- Blocklist
- A list of known malicious indicators (IPs, domains, URLs, email addresses) used by mail servers, firewalls, and security tools to automatically block or flag suspicious traffic. Also called a blacklist or denylist.See also: DNSBL, RBL
- BoltDB
- An embedded key-value database written in Go. Used by the vspam-agent for local caching of IOC lookup results, enabling fast repeat checks without network round-trips.
C
- C2
- Command and Control. The infrastructure (servers, domains, protocols) that attackers use to communicate with and control compromised systems (bots). C2 servers issue commands to malware and receive stolen data.See also: IOC
- Confidence Score
- A numeric value (0–100) assigned to each IOC in the vspam.org database, representing the platform's certainty that the indicator is truly malicious. Calculated from reporter trust tier, number of confirming votes, and corroborating evidence.See also: IOC, Trust Tier
D
- DNSBL
- DNS-based Blocklist. A blocklist published via the DNS protocol, allowing mail servers to check sender IPs or domains in real-time during SMTP transactions. Mail servers query a special DNS zone (e.g., dnsbl.vspam.org) and receive an answer indicating whether the queried entity is listed.See also: RBL, RPZ
F
- False Positive
- When a legitimate sender, domain, or URL is incorrectly classified as malicious. False positives in a DNSBL can cause legitimate email to be blocked. vspam.org uses trust-weighted voting to minimize false positive rates (measured at 0.003%).See also: DNSBL, Trust Tier
I
- IOC
- Indicator of Compromise. A piece of forensic evidence that identifies potentially malicious activity. In the context of vspam.org, IOCs include phishing URLs, malicious domains, abusive IP addresses, and spam sender email addresses. Each IOC is stored as a SHA-256 hash for privacy-preserving lookups.See also: STIX
M
P
Q
- Quishing
- QR-code phishing. An attack that embeds malicious URLs in QR codes, typically distributed via email or physical media, to bypass traditional URL-scanning defenses and redirect victims to credential-harvesting pages.See also: Phishing
R
- RBL
- Real-time Blocklist (or Real-time Blackhole List). A type of DNSBL specifically focused on IP addresses that are sources of spam or abuse. Mail servers query the RBL during SMTP connections to decide whether to accept or reject mail from a given IP.See also: DNSBL
- RPZ
- Response Policy Zone. A DNS mechanism that allows DNS resolvers to override responses for specific domains, effectively blocking resolution of known-malicious domains at the DNS layer. vspam.org publishes RPZ zone files for integration with PowerDNS, BIND, and Unbound.See also: DNSBL
S
T
- TAXII
- Trusted Automated Exchange of Intelligence Information. A transport protocol for sharing STIX-formatted threat intelligence over HTTPS. TAXII defines discovery, collection, and polling APIs that allow automated feed consumption. vspam.org exposes a TAXII 2.1 server.See also: STIX
- Trust Tier
- A reputation level assigned to vspam.org reporters based on their submission history and accuracy. Four tiers exist: Newcomer (1x vote weight), Trusted (2x), Verified (4x), and Core (8x). Higher tiers require sustained accurate reporting and earn additional platform privileges.See also: Confidence Score
X
- XARF
- Extended Abuse Reporting Format. A standardized JSON-based format for submitting abuse reports to hosting providers and ISPs. XARF reports include structured metadata about the abuse event, improving automated processing and response times compared to free-text email reports.
Missing a term? Let us know and we'll add it. For platform-specific documentation, see the API docs, FAQ, or Getting Started guide.