Monthly Archives: July 2016

CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016

CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016 In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit… Read more »

CyberSecurity Headlines: Hack the Pentagon, North Korea and Pokemon Go

CyberSecurity Headlines: Hack the Pentagon, North Korea’s Cyber Army and Pokemon Go In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit down… Read more »

Acunetix Partnership Announcement

Acunetix Partnership Announcement CyberTraining 365 is the best destination for furthering your cybersecurity training and education. We make it our priority to give you comprehensive understanding of classic cybersecurity methods and techniques as well as giving you access to the most relevant, up-to-date technologies available. This is why we’ve partnered… Read more »

Rapid7 Partnership Announcement

Rapid7 Partnership Announcement With CyberTraining 365 being the best destination for furthering your cybersecurity training and education, and Rapid7 having top-notch threat exposure management, incident detection and response, and security advisory services, a partnership between us just makes sense. Rapid7 is trusted by many popular, quality brands including Microsoft, IBM,… Read more »

Cyber Threats: Brute-force Cracking

cyber threats types of cyber attacks

Cyber Threats: Brute-force Cracking Brute-force cracking basically amounts to continually guessing a password until one gets it right, allowing entry to a site. It can also mean similar trial-and-error means of finding hidden pages. The most common method of brute-force attacks are dictionary attacks. A dictionary attack utilizes a password… Read more »

Cyber Threats: Spear Phishing Attack

cyber threats types of cyber attacks

  Cyber Threats: Spear Phishing Attack A Spear phishing attack is among the most popular entry points of cybersecurity breaches. According to a report from Trend Micro, 91% of cyberattacks are initiated by a spear phishing email. A spear phishing attack requires advanced hacking skills and are very hard to detect because… Read more »

Cyber Threats: Phishing Attacks

cyber threats types of cyber attacks

Cyber Threats: Phishing Attacks Phishing Attacks are the primary vector for malware attacks and are usually comprised of a malicious e-mail attachment or an e-mail with a malicious link. Phishing e-mails typically, falsely claim to be an established or legitimate enterprise. Once the malicious attachment or link has been opened, users are… Read more »

Protected: CounterTack Partnership Announcement

Manpreet Wadan   July 5, 2016   Enter your password to view comments.

Cyber Threats: Drive-by Download Attacks

cyber threats types of cyber attacks

Cyber Threats: Drive-by Download Attacks Drive-by Download Attacks are ignited simply by a victim clicking a link which, unwittingly to them, injects malicious software onto their computer- or other device. The malware most frequently used in Drive-by Download Attacks are called Trojans. Trojans get their name for their deceitful nature; so… Read more »