THREATS

Everything to know about cyber threats.

FAQ

A cyber threat is “any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service.”

Corporate Spies

Criminal Groups

Hacktivists

Malicious Hackers

Malicious Insiders

Nation-state attackers

Terrorist Groups

Data

Infrastructure

Network

Financial gain / Profit

Reputation enhancement

Seek revenge

Espionage Political Damage

Economic Damage

Cyber Warfare

Social Awareness

Ideological

Publicity

Propaganda

Geopolitical

Satisfaction

Discontent

ADVERTISEMENT

TYPES OF THREATS

APT

0
SHARES
0
VIEWS

An APT is a cyber attack launched against a specific company, person or institution. These attacks are usually deployed by well-trained attackers using advanced technology, strategic tactics and the necessary (financial) resources. APTs are well-structured and complex.

Read more
ADVERTISEMENT
0
SHARES
0
VIEWS

A digital currency based on mathematics, where encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds.

Read more
ADVERTISEMENT
0
SHARES
0
VIEWS

Short for “malicious software”. It is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Read more
ADVERTISEMENT
0
SHARES
0
VIEWS

In spear phishing, a criminal specifically targets an individual or an organization, trying to obtain specific pieces of information, often with a specific end goal in mind.

Read more
ADVERTISEMENT

DoS / DDoS ATTACKS

0
SHARES
0
VIEWS

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as...

Read more

Welcome Back!

Create New Account!

Retrieve your password

Please enter your username or email address to reset your password.

Add New Playlist