Categorias: Todos - malware - privacy - cybersecurity - authentication

por dr inż. Michał Malinowski 1 mês atrás

51

Cyberzagrożenia

The landscape of digital threats is vast and continually evolving, encompassing a wide array of attack vectors and vulnerabilities. Cybersecurity professionals must be vigilant against various forms of malware such as viruses, worms, spyware, and ransomware.

Cyberzagrożenia

Cyberzagrożenia

Uczenie maszynowe i AI

Trojaning Attacks
Model Stealing
Model Inversion
Membership Inference Attacks
Inference Attacks
Data Poisoning
AI-Powered Attacks
Adversarial Attacks
Poisoning
Evasion

Systemy i infrastruktura

System Service Exploitation
Supply Chain Attacks
Rootkits
User-mode
Kernel-mode
Ransomware
Locker Ransomware
Crypto Ransomware
Malware
Worm
Virus
Trojan
Spyware
Firmware Attacks
Exploitation of Remote Services
Bootkit

Sieć

Traffic Interception
Rogue Access Points
Network Sniffing
Network Service Scanning
Man-in-the-Middle (MitM)
Wi-Fi Eavesdropping
SSL Stripping
IP Spoofing
DNS Tunneling
DNS Spoofing
DDoS / Denial-of-Service (DoS)
Volumetric
Application Layer
ARP Spoofing

Przetwarzanie danych i prywatność

Shadow IT
Privacy Violations
Unauthorized Sharing
Data Breaches
Differential Privacy Attacks
Data Remanence
Data Manipulation
Data Leakage
Data Destruction

Inżynieria społeczna

Watering Hole Attack
Tailgating
Social Engineering Attacks
Quizzing
Pretexting
Impersonation
Business Email Compromise (BEC)
Baiting

Internet Rzeczy (IoT)

Weak Authentication Mechanisms
Replay Attacks
Privilege Escalation in IoT Devices
Physical Tampering with IoT Devices
IoT-Based Attacks
Firmware Manipulation
Device Hijacking
Data Interception in IoT Networks
Botnety IoT

Fizyczne

Physical Access Attacks
Keyloggers
Software
Hardware
Insider Threats
Hardware Tampering
Emanation Attacks
Dumpster Diving
Device Theft
Cold Boot Attack

Dostęp i uwierzytelnienie

Social Engineering via Authentication Systems
Session Hijacking
Token Theft
Cookie Hijacking
Phishing
Whaling
Vishing
Spear Phishing
Smishing
Pharming
Man-in-the-Email (MitE)
HTTPS Phishing
Clone Phishing
CEO Fraud
Angler Phishing
Password Spraying
Identity-Based Attacks
Forced Browsing
Exploitation for Credential Access
Credential Stuffing
Brute Force
Online Brute Force
Offline Brute Force

Aplikacje

Template Injection
SQL Injection
Union-based
Error-based
Blind
Server-Side Request Forgery (SSRF)
Remote Code Execution (RCE)
File Inclusion
Command Injection
Insecure Deserialization
File Upload Vulnerabilities
Deserialization of Untrusted Data
Cross-Site Scripting (XSS)
Stored
Reflected
DOM-based
Cross-Site Request Forgery (CSRF)
Code Injection Attacks