Top Cyber Attact

Here are eight of the most frequently used types of cyberattacks, from phishing and malware to SQL injection, zero-day exploits, APTs, and ransomware. These are summarized to help you stay vigilant at all times.

  1. Phishing: A fraudulent attempt to impersonate a trusted party to steal sensitive data.
  2. Malware/Ransomware: A malicious program that steals data or blocks access, demanding a ransom to restore access.
  3. DoS/DDoS: An attack that floods a system with fake traffic, making the service unavailable.
  4. MitM (Man-in-the-Middle): Undetected interception of communications between two parties, often used to steal data.
  5. SQL Injection: Inserting malicious code into application input to compromise or damage a database.
  6. Zero-Day Exploit: Exploiting a security vulnerability in software that is unknown to the vendor and has not yet been patched.
  7. APT (Advanced Persistent Threat): A long-term, targeted attack that penetrates undetected and systematically steals information.

Share:

More Posts

Eid Al-Fitr Mubarak

The Directorate of Information Systems and Technology at Diponegoro University wishes you a Happy Eid