1. Phishing:
Whale Phishing: Targets high-profile individuals.
Spear Attack: Precision-targeted phishing.
Pharming: Redirects users to malicious sites.
2. Injection:
SQL Threat: Exploits SQL database vulnerabilities.
3. Man-in-the-Middle (MITM) Attack:
Session Hijacking: Steals active sessions.
IP Spoofing: Masks the attacker's identity.
Replay: Replays intercepted data.
4. Distributed Denial of Service (DDoS) Attack:
Overwhelms a system, causing service disruption.
5. Cross-Site Scripting (XSS):
Exploits web application vulnerabilities.
6. AI-Powered Attacks:
Harnesses artificial intelligence for cyber threats.
7. Password Attacks:
Brute Force: Repeated login attempts.
Guessing: Predicts passwords.
Dictionary Attack: Uses precompiled lists.
8. Eavesdropping Attack:
Intercepts and monitors communication.
9. Drive-By Attack:
Malicious code execution upon website visit.
10. Ransomware Attack:
Encrypts files, demanding ransom for decryption.
Comments
Post a Comment