The cybersecurity world is full of technical lingo and jargon.This glossary includes some of the most common — and not so common — words and expressions that we use in our articles.Advanced persistent threat (APT) is often categorized as a hacker.Arbitrary code execution can be achieved remotely or with physical access.Hackers are historically categorized as either “black hat” or “white hat,” usually depending on the motivations.Botnets are networks of hijacked internet-connected devices for the purposes of being used in cyberattacks.A bug is essentially the cause of a software glitch.Command-and-control servers (also known as C2 servers) are used by cybercriminals to remotely manage and control their fleets.Cryptojacking is when a device’s computational power is used, with or without the owner’s permission, to generate cryptocurrency.Data breach is when protected data was confirmed to have improperly left a system from where it was originally stored.