Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 405

False Negative

What is False Negative?

False NegativeMalicious activity that a detection failed to flag, leaving the threat unnoticed and allowing the attacker to continue without alerting defenders.


A false negative is the silent failure of a detection: a real attack happens but no alert fires, so analysts have no chance to respond. Causes include missing log sources, signatures that the attacker evaded, detections scoped too narrowly, broken pipelines, time-window gaps, and adversary tradecraft such as living-off-the-land or encrypted command and control. False negatives are harder to measure than false positives because by definition they are invisible. Teams reduce them through purple-team exercises, breach-and-attack simulation, MITRE ATT&CK coverage mapping, detection unit tests, and ongoing telemetry gap analysis.

Examples

  1. 01

    An adversary uses signed Windows binaries (LOLBins) to run commands that no signature catches.

  2. 02

    A new malware family is missed because its TLS C2 traffic is not inspected by the proxy.

Frequently asked questions

What is False Negative?

Malicious activity that a detection failed to flag, leaving the threat unnoticed and allowing the attacker to continue without alerting defenders. It belongs to the Defense & Operations category of cybersecurity.

What does False Negative mean?

Malicious activity that a detection failed to flag, leaving the threat unnoticed and allowing the attacker to continue without alerting defenders.

How does False Negative work?

A false negative is the silent failure of a detection: a real attack happens but no alert fires, so analysts have no chance to respond. Causes include missing log sources, signatures that the attacker evaded, detections scoped too narrowly, broken pipelines, time-window gaps, and adversary tradecraft such as living-off-the-land or encrypted command and control. False negatives are harder to measure than false positives because by definition they are invisible. Teams reduce them through purple-team exercises, breach-and-attack simulation, MITRE ATT&CK coverage mapping, detection unit tests, and ongoing telemetry gap analysis.

How do you defend against False Negative?

Defences for False Negative typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for False Negative?

Common alternative names include: FN, Missed detection.

Related terms

See also