- Phishing: Phishing is a cyberattack where attackers pretend to be someone known to trick individuals into revealing sensitive information, for example, credit card details, passwords, usernames or other personal details. These attacks often occur through deceptive emails, messages, or websites that appear legitimate.
- Spear Phishing: Targeted phishing attacks aimed at specific individuals or organizations.
- Whaling: Spear phishing attacks targeting high-profile individuals like executives.
- Malware: Malware stands for "Malicious software." designed to harm your computer, device, or network.
- Ransomware: Ransomware is a type of malware that locks your files or computer and asks you to pay money (a ransom) to get them back. It's like someone breaking into your house, locking all your belongings in a box, and telling you they'll only give the key if you pay them.
- Trojan Horse: Trojans pretend to be legitimate software to trick users into installing them. Once inside, they can steal data, provide backdoor access to attackers, or deliver other malware.
- Spyware: Spyware is a type of malware that secretly watches what you do on your computer or phone and sends that information to attacker.It's like a hidden spy following your every move without you knowing.
- Adware: Software that displays unwanted ads.
- Rootkits: Rootkits are designed to gain administrative access to your system without your knowledge. They can hide other malware and allow attackers to control your device remotely.
- Worms: A worm is a type of malware that spreads on its own. It doesn't need you to click anything or open a file. Once it gets into your computer or network, it makes copies of itself and moves to other devices.
- Viruses: A virus attaches itself to legitimate files or programs and activates when the infected file is opened or executed. It spreads by replicating itself and can damage files, slow down systems, or crash devices.
- SQL Injection: Inserting malicious SQL code into a query to manipulate databases.
- Cross-Site Scripting (XSS): XSS allows attackers to inject malicious java scripts into a web page, These scripts execute in the victim's browser and can steal sensitive information or hijack user sessions.
- Cross-Site Request Forgery (CSRF): Forcing an authenticated user to perform unwanted actions.
- Man-in-the-Middle (MITM): Intercepting and altering communication between two parties.
- Denial of Service (DoS): Overloading a system to make it unavailable to users.
- Distributed Denial of Service (DDoS): Using multiple systems to launch a DoS attack.
- Brute Force Attack: Attempts every possible combination of characters to guess a password.
- Dictionary Attack: Uses a predefined list of common passwords or phrases to guess.
- Credential Stuffing: Using stolen credentials from one service to access another.
- Password Spraying: Using a few common passwords against many accounts.
- Zero-Day Exploit: Attacks on vulnerabilities that are not yet known to the vendor.
- Privilege Escalation: Gaining higher access levels within a system.
- Session Hijacking: Stealing a user's session token to gain unauthorized access.
- Eavesdropping Attack: Intercepting data being transmitted over a network.
- Rogue Access Points: Unauthorized wireless access points that mimic legitimate ones.
- DNS Spoofing: Altering DNS records to redirect traffic to malicious sites.
- ARP Spoofing: Sending falsified ARP messages to a local network.
- Watering Hole Attack: Compromising a website to target specific users.
- Drive-by Download: Automatically downloading malware when visiting a compromised site.
- Clickjacking: Tricking users into clicking on malicious links.
- Formjacking: Injecting malicious code into online forms to steal information.
- Session Fixation: Forcing a user's session ID to a known value.
- Business Email Compromise (BEC): Targeting businesses to steal sensitive information via email.
- Insider Threats: Attacks from individuals within the organization.
- Social Engineering: It is a psychological manipulation technique used by attackers to trick individuals into revealing sensitive information, such as passwords, financial details, or access credentials.
- Fake Antimalware: Software posing as legitimate security software to infect systems.
- Bluejacking: Sending unsolicited messages over Bluetooth.
- Bluesnarfing: Stealing data from a Bluetooth-enabled device.
- SIM Swapping: Gaining control of a mobile number by tricking the carrier.
- Juice Jacking: Infecting devices via public charging stations.
- Firmware Attacks: Compromising firmware to control hardware.
- Physical Attacks: Directly tampering with hardware to steal data.
- IoT Attacks: Targeting Internet of Things devices to gain unauthorized access.
- Botnets: Networks of infected devices controlled by an attacker.
- Cryptojacking: Using someone else's device to mine cryptocurrency.
- Supply Chain Attacks: Compromising a supplier to attack its customers.
- Virtual Machine Escape: Breaking out of a VM to interact with the host system.
- Email Spoofing: Sending emails from a forged sender address.
- Typosquatting: Creating websites with URLs similar to legitimate ones to trick users.
Top Attacks Database
Subscribe to:
Posts (Atom)
Popular Posts
-
Multiple Login Failures from a Single User Objective: The objective of this use case is to identify brute force attacks that could be dictio...
-
Windows Account Types References : Local and Domain Accounts Types of windows accounts
-
The Basics of DNS: The Internet's Address Book Imagine if every time you wanted to call a friend, you had to remember their exact 10-d...
-
Malicious URL access detected means when a user or host attempts a connection to a malicious website, like phishing pages, malware, or comm...
-
Unfamiliar Sign-In means a security event where a login attempt is detected from a device, location, or IP address that was not previousl...
-
T shark - TShark is the command-line version of Wireshark It performs similar network packet capture and analysis functions but withou...
-
Multiple VPN Logins From Different Countries means that the same user account is trying to log in from multiple geographical locations thro...
-
Ramya is an intelligent and ambitious young woman with a deep passion for creating websites and a talent for crafting beautiful wool product...
-
In the Windows operating system, the nslookup command is used to query DNS records. For example, to query the DNS A record for a domain, u...
-
Zone files are plain text files that store information about a specific domain's DNS configuration. They are part of the Domain Name Sys...