Cyber Threats

Know Your Enemy

Understanding how cyber attacks work is the first step to defending against them. Explore our threat database to learn attack vectors, indicators of compromise, and protection strategies.

Critical
High Risk
Medium
Low
Critical

Phishing Attacks

Deceptive emails, websites, and messages designed to steal credentials and personal information. The most common attack vector targeting individuals.

91% of attacks start here
Critical

Ransomware

Malware that encrypts your files and demands payment for decryption. Can devastate individuals and organizations alike.

$20B+ damages in 2024
High

Malware Types

Comprehensive overview of malicious software: viruses, trojans, worms, spyware, adware, rootkits, and keyloggers.

560,000 new samples daily
Critical

Social Engineering

Psychological manipulation techniques: pretexting, baiting, tailgating, and quid pro quo. Exploiting human nature rather than technical vulnerabilities.

Targets human psychology
Critical

Zero-Day Exploits

Attacks exploiting unknown vulnerabilities before patches exist. Highly valuable to attackers and difficult to defend against.

No patch available
High

DDoS Attacks

Distributed Denial of Service attacks overwhelm systems with traffic. Used for extortion, hacktivism, and competitive sabotage.

Attacks up 150% yearly
High

Man-in-the-Middle

Attackers intercept communications between two parties. Common on unsecured WiFi networks. HTTPS and VPNs provide protection.

Public WiFi danger
High

SQL Injection

Exploiting vulnerabilities in database queries to access, modify, or delete data. One of the oldest yet still prevalent web attacks.

#1 web vulnerability
Medium

Cross-Site Scripting (XSS)

Injecting malicious scripts into trusted websites. Can steal cookies, session tokens, and redirect users to malicious sites.

Affects web applications
Critical

Supply Chain Attacks

Compromising software supply chains to distribute malware through trusted updates. SolarWinds and Log4j showed devastating potential.

Growing threat vector