THREATS

Everything to know about cyber threats.

FAQ

A cyber threat is “any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service.”

Corporate Spies

Criminal Groups

Hacktivists

Malicious Hackers

Malicious Insiders

Nation-state attackers

Terrorist Groups

Data

Infrastructure

Network

Financial gain / Profit

Reputation enhancement

Seek revenge

Espionage Political Damage

Economic Damage

Cyber Warfare

Social Awareness

Ideological

Publicity

Propaganda

Geopolitical

Satisfaction

Discontent

ADVERTISEMENT

TYPES OF THREATS

APT

An APT is a cyber attack launched against a specific company, person or institution. These attacks are usually deployed by well-trained attackers using advanced technology, strategic tactics and the necessary (financial) resources. APTs are well-structured and complex.

Read more
ADVERTISEMENT
5G

5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices. 5G wireless technology is meant to deliver higher multi-Gbps peak data speeds, ultra low latency, more reliability,...

Read more
ADVERTISEMENT
Cryptojacking

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies. It’s a burgeoning menace that can take over web browsers, as well as compromise all kinds of devices, from desktops and laptops, to smart phones and even network...

Read more
ADVERTISEMENT
Spear Phishing

In spear phishing, a criminal specifically targets an individual or an organization, trying to obtain specific pieces of information, often with a specific end goal in mind.

Read more
ADVERTISEMENT

DoS / DDoS ATTACKS

DDoS

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as...

Read more

Welcome Back!

Login to your account below

Retrieve your password

Please enter your username or email address to reset your password.

Add New Playlist