Any software that is designed to cause damage, steal data, or otherwise harm a user, computer, or network. Examples include computer viruses and spyware.
A type of attack where cybercriminals impersonate legitimate entities to trick individuals into giving them sensitive information, such as passwords or credit card numbers. Common forms of phishing are sent out via email and SMS.
Ransomware is a type of malware that encrypts a victim’s files, rendering them inaccessible, and demands payment (ransom) to restore access.
A DDoS attack occurs when multiple compromised systems flood a target (such as a website or server) with traffic, overwhelming it and causing it to go offline.
A botnet is a network of computers (bots) that are controlled remotely by cybercriminals. They are often used to conduct large-scale cyberattacks such as DDoS attacks or to distribute malware. Botnets are typically formed by infecting computers with malware that allows remote control.
Social engineering is a technique used by cybercriminals to manipulate individuals into disclosing confidential information or performing actions that compromise security. The most widespread example of Social Engineering is Phishing.
A data breach occurs when sensitive, protected, or confidential data is accessed, disclosed, or stolen by an unauthorized entity.
Usually used in the context of software. A flaw or weakness in code that can be exploited by attackers to gain unauthorized access or cause damage to a system. Vulnerabilities can be targeted by cybercriminals to launch attacks, steal data, or disrupt services, making them a significant security threat.
An attack that targets a previously unknown vulnerability in software or hardware, which developers have had “zero days” to fix. These exploits are particularly dangerous because they can spread quickly before the exploit can be fixed.
SQL Injection is a type of cyberattack that allows cybercriminals to manipulate the – very common – SQL type of database and access unauthorized data. This is done by inserting malicious SQL code into a query to the database.