A cyberattack is an attempt to disable computers, steal data, or use a compromised computer system to launch additional attacks. Cybercriminals use different methods to launch a cyberattack including malware, phishing, ransomware, man -in-the-middle attacks or other methods.

Types of Cyber ​​Attacks

Malware enters a network through a vulnerability, usually when a user clicks on a dangerous link or email attachment that then installs risky software.


Phishing is the method of sending fraudulent communications that appear to come from a trusted source, usually via email. The goal is to steal or obtain sensitive data such as credit card and login information or install malware on the victim’s machine. Phishing is an increasingly common cyber threat.

Attack by interception

Man-in-the-middle attacks (MitM), also known as “eavesdropping” attacks, occur when hackers insert themselves into a two-party transaction. Once hackers disrupt traffic, they can filter and steal data.

Two common entry points for MitM attacks:

On an unsecured public Wi-Fi network, hackers can insert themselves between a visitor’s device and the network. Unknowingly, the visitor passes all the information through the hacker.

Once the malware enters a device, a hacker can install software to process all of the victim’s information.

Denial of service attack

A denial of service attack fills systems, servers, or networks with traffic that drains resources and bandwidth. This prevents the system from responding to legitimate requests. The hackers also use several compromised devices to launch this attack. This is a Distributed Denial of Service (DDoS) attack.

SQL Injection

An SQL (Structured Query Language) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information that it normally would not. A hacker can perform SQL injection simply by sending malicious code to a vulnerable website search box.

Zero Day Attack

A zero-day attack strikes after a network vulnerability is announced, but before a patch or solution is in place. Hackers are targeting the disclosed vulnerability during this time. Detecting zero-day vulnerability threats requires constant awareness.


The DNS tunnel uses the DNS protocol to communicate non-DNS traffic on port 53. It sends HTTP traffic and other protocols through DNS. However, there are also malicious reasons to use DNS VPN tunneling services. They can be used to disguise outbound traffic as DNS, hiding data that is typically shared over an Internet connection.

What happens during a cyberattack?

A cyberattack occurs when cybercriminals attempt to illegally access electronic data stored on a computer or network. The intention could be to damage the reputation of a company or an individual, or to steal valuable data. Cyberattacks can target individuals, groups, organizations or governments.

How to prevent cyberattacks

There are 7 key strategies that we recommend to protect an SME or organization against cyberattacks.

One of the most effective ways to prevent cyberattacks is to ensure that multi-factor authentication has been enabled for all applications that access the Internet in a company.

Simply setting up a password is not enough to get employees to log in. If employee passwords are compromised by a hack or phishing scam, cybercriminals can easily gain access to systems.

Enabling a multi-factor authentication process for logins requires employees to provide multiple credentials instead of just one. Therefore, security will be enhanced. It will be much more difficult for any unauthorized person to gain access to the systems.

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *