Cyberzagrożenia

Aplikacje

Code Injection Attacks

Cross-Site Request Forgery (CSRF)

Cross-Site Scripting (XSS)

DOM-based

Reflected

Stored

Deserialization of Untrusted Data

File Upload Vulnerabilities

Insecure Deserialization

Remote Code Execution (RCE)

Command Injection

File Inclusion

Server-Side Request Forgery (SSRF)

SQL Injection

Blind

Error-based

Union-based

Template Injection

Dostęp i uwierzytelnienie

Brute Force

Offline Brute Force

Online Brute Force

Credential Stuffing

Exploitation for Credential Access

Forced Browsing

Identity-Based Attacks

Password Spraying

Phishing

Angler Phishing

CEO Fraud

Clone Phishing

HTTPS Phishing

Man-in-the-Email (MitE)

Pharming

Smishing

Spear Phishing

Vishing

Whaling

Session Hijacking

Cookie Hijacking

Token Theft

Social Engineering via Authentication Systems

Fizyczne

Cold Boot Attack

Device Theft

Dumpster Diving

Emanation Attacks

Hardware Tampering

Insider Threats

Keyloggers

Hardware

Software

Physical Access Attacks

Internet Rzeczy (IoT)

Botnety IoT

Data Interception in IoT Networks

Device Hijacking

Firmware Manipulation

IoT-Based Attacks

Physical Tampering with IoT Devices

Privilege Escalation in IoT Devices

Replay Attacks

Weak Authentication Mechanisms

Inżynieria społeczna

Baiting

Business Email Compromise (BEC)

Impersonation

Pretexting

Quizzing

Smishing

Social Engineering Attacks

Tailgating

Vishing

Watering Hole Attack

Przetwarzanie danych i prywatność

Data Destruction

Data Leakage

Data Manipulation

Data Remanence

Differential Privacy Attacks

Privacy Violations

Data Breaches

Unauthorized Sharing

Shadow IT

Sieć

ARP Spoofing

DDoS / Denial-of-Service (DoS)

Application Layer

Volumetric

DNS Spoofing

DNS Tunneling

IP Spoofing

Man-in-the-Middle (MitM)

SSL Stripping

Wi-Fi Eavesdropping

Network Service Scanning

Network Sniffing

Rogue Access Points

Traffic Interception

Systemy i infrastruktura

Bootkit

Exploitation of Remote Services

Firmware Attacks

IoT-Based Attacks

Malware

Spyware

Trojan

Virus

Worm

Ransomware

Crypto Ransomware

Locker Ransomware

Rootkits

Kernel-mode

User-mode

Supply Chain Attacks

System Service Exploitation

Uczenie maszynowe i AI

Adversarial Attacks

Evasion

Poisoning

AI-Powered Attacks

Data Poisoning

Inference Attacks

Membership Inference Attacks

Model Inversion

Model Stealing

Trojaning Attacks