Types of Attacks
Malicious Software
100

These are deceptive emails or messages that mimic legitimate sources to steal sensitive information like passwords, credit card numbers, and personal details.

Phishing

100

A type of malware that, when executed, replicates by inserting copies of itself into other computer programs, data files, the operating system, or the boot sector of the hard drive.

Virus

200

These include brute force and dictionary attacks, where attackers try numerous word combinations to gain unauthorized access.

Password Attacks

200

This malware type records the keystrokes made on a computer to steal passwords or other sensitive information typed by the user.

Keylogger

300

These attacks exploit human psychology to trick individuals into revealing sensitive information or performing actions that compromise their security.

Social Engineering Attacks

300

Like a virus, this malware replicates itself to spread to other computers. Unlike a virus, it can do so without human intervention and does not need to attach itself to a software program.

Worm

400

These attacks aim to shut down a machine or network, making it inaccessible to its intended users by flooding the target with nonsense network traffic or sending it information that triggers a crash.

Denial of Service (DoS) / Distributed Denial of Service (DDoS) Attacks

400

Malware designed specifically to steal sensitive and private information from infected computers. This category of malware targets personal and confidential data, which can include various types of information like login credentials stored in a browser.

InfoStealer

500

An attack where malware is unknowingly downloaded onto a user's computer or device. These attacks occur when a user visits a malicious or compromised website.  

Drive-By Downloads

500

Malware that encrypts the victim's files and demands a a payment to restore access to them. It often spreads through phishing emails or by unknowingly visiting an infected website.

Ransomware