Methods of a cyber attack
Cybercrime is constantly changing, with new methods being developed to find and exploit security vulnerabilities. In general, IT security presents itself asymmetrically: To significantly impact a company's operations, an attacker only needs to successfully exploit a single vulnerability. Companies, on the other hand, need to ensure holistic protection in order to secure themselves comprehensively.
Advanced Persistent Threats (APTs) translate to "advanced persistent threat." Hackers spend a great deal of time, effort and resources to penetrate a system. First they infiltrate a computer in order to use it to spy on internal processes and from there sabotage the entire network. This gives the attackers permanent access to a network and from there they can spread further malware to attack the entire system.
Malware can be any type of malicious program that can cause damage to the infected systems. This includes worms, viruses, Trojans or even ransomware. WannaCry, Petya and Ryuk in particular have shown in recent years that malware is quite capable of bringing companies to the brink of business standstill or even insolvency if cyber security is inadequate. Click here for malware updates.
Phishing is a fraud attempt carried out electronically, in which the recipient is sent a fake e-mail, which he often does not recognize as such at first. This method of attack, in the form of a professional-looking e-mail, is often designed in such a way that the recipient may be tricked into disclosing sensitive data. This refers to personal data, for example.