Active Attack

24th December 2019 | Cybrary Active Attack


active attack cybrary

An Active Attack is a network exploit where hackers strive to change or exfiltrate data on the target’s network or device. There are several different types of active attacks or ways hackers can exploit your systems. An active attack is where the hacker is actively working to exploit the victim and edit/exfiltrate data and the victim is typically aware of the threat. Active attacks are different from ‘passive attacks’, where hackers typically are not known in the systems by the victim and are simply viewing all of the data passing through the network. Passive attacks are mostly threats to the confidentiality of data, where active attacks are attacks on integrity and availability. 

What Does This Mean for my SMB?

In order to protect against active and passive attacks, it’s vital that you have some sort of Antivirus/Antimalware solution in place to help reduce the likelihood of exploitation. CyberHoot also recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot

To learn more about Active Attacks, watch this short video:

Sources: TechTarget, YouTube

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more