Cyber Attacks You Need To Know

BY: GEETANJALI MISHRA

Malware infiltrates and damages systems, networks, or devices. Includes: Viruses, worms, spyware & ransomware.

Malware

Hackers encrypt files & demand ransom for decryption. Pay or lose access.

Ransomware

Attackers flood networks with traffic, making them unavailable to real users.

DoS & DDoS Attacks

Hackers intercept communications between two parties. Sensitive data at risk.

MITM (Man-in-the-Middle)

Malicious code inserted into queries manipulates or steals sensitive data.

SQL Injection

Employees misuse their access to harm the organisation sometimes accidentally, sometimes intentionally.

Insider Threats

Hackers exploit flaws unknown to software vendors, making them tough to stop.

Zero-Day Exploits

Compromising vendors or partners to indirectly breach target systems.

Supply Chain Attacks

Hackers hide malicious data inside DNS requests, slipping past security controls.

DNS Tunnelling

Cyber attacks are evolving fast. So, Update systems, Use strong passwords, Stay alert to threats

Stay Safe Online