Active Attack

24th December 2019 | Cybrary Active Attack


active attack cybrary

An Active Attack is a network exploit where hackers strive to change or exfiltrate data on the target’s network or device. There are several different types of active attacks or ways hackers can exploit your systems. An active attack is where the hacker is actively working to exploit the victim and edit/exfiltrate data and the victim is typically aware of the threat. Active attacks are different from ‘passive attacks’, where hackers typically are not known in the systems by the victim and are simply viewing all of the data passing through the network. Passive attacks are mostly threats to the confidentiality of data, where active attacks are attacks on integrity and availability. 

What Does This Mean for my SMB?

In order to protect against active and passive attacks, it’s vital that you have some sort of Antivirus/Antimalware solution in place to help reduce the likelihood of exploitation. CyberHoot also recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot

To learn more about Active Attacks, watch this short video:

Sources: TechTarget, YouTube

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

Cybercriminals always follow Internet eyeballs. Not literally, but figuratively. And today's eyeballs are...

Read more
CISA Details an Emerging Mobile Spyware Alert

CISA Details an Emerging Mobile Spyware Alert

Active Attacks on Messaging Apps The Cybersecurity and Infrastructure Security Agency (CISA) recently issued...

Read more
Zero Trust RPAM: The Future of Secure Remote Access

Zero Trust RPAM: The Future of Secure Remote Access

The world of work has changed enormously since COVID-19. Gone are the days when IT admins sat behind a corporate...

Read more