Common attack vectors and exploitation, by Iddrisu Lampaku(CyberSecurity Analyst)
This is a satirical website. Don't take it Seriously. It's a joke.
2059 49339 Shares
Ladies and gentlemen, As Hackers gets smart and sophisticated due to the tools they currently have in their “arsenal” gives them the leverage to gain access to a network server. As noted earlier Advanced Persistent Threat adversaries(hackers) also runs highly targeted, multifaceted campaigns to exploit vulnerabilities either through holes in an organization's security implementation or by targeting the human element which often uses social engineering. Financially motivated actors indiscriminately send mass spam emails in credential harvesting campaigns or deploy ransomware. These attack vectors are the most common against organizations of any size, but often have a greater impact on small to medium-sized business that may not have a robust security posture.
Below are some of the common attack vectors that are commonly used by cybercriminals to deliver a payload and exploit system vulnerabilities;
* Malware(script/code)
* phishing(disguised as legitimate sender)
*Drive-by-download
* Distributed denial of service(DDoS)
* Domain shadowing
* Malvertising(Ad).
Thank you all for your time and to see next week for the next session. Iddrisu Lampaku(CyberSecurity analyst)
This is a satirical website. Don't take it Seriously. It's a joke.
Most Popular
-
1
trudeau approves new canadian flag design
Rumor has it Canadian prime minister Justin Trudeau, working closely with The Honourable Pablo Rodriguezo, Canadian Heritage minister and Quebec Lieutenant, have finalized the new flag design. Trudeau stated "We are very excited to unveil this updated design which better reflects the direction we are moving the country to" Once approved, unveiling is to take place this year on Canada day.