Active Attack

24th December 2019 | Cybrary Active Attack


active attack cybrary

An Active Attack is a network exploit where hackers strive to change or exfiltrate data on the target’s network or device. There are several different types of active attacks or ways hackers can exploit your systems. An active attack is where the hacker is actively working to exploit the victim and edit/exfiltrate data and the victim is typically aware of the threat. Active attacks are different from ‘passive attacks’, where hackers typically are not known in the systems by the victim and are simply viewing all of the data passing through the network. Passive attacks are mostly threats to the confidentiality of data, where active attacks are attacks on integrity and availability. 

What Does This Mean for my SMB?

In order to protect against active and passive attacks, it’s vital that you have some sort of Antivirus/Antimalware solution in place to help reduce the likelihood of exploitation. CyberHoot also recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot

To learn more about Active Attacks, watch this short video:

Sources: TechTarget, YouTube

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more