Active Attack

24th December 2019 | Cybrary Active Attack


active attack cybrary

An Active Attack is a network exploit where hackers strive to change or exfiltrate data on the target’s network or device. There are several different types of active attacks or ways hackers can exploit your systems. An active attack is where the hacker is actively working to exploit the victim and edit/exfiltrate data and the victim is typically aware of the threat. Active attacks are different from ‘passive attacks’, where hackers typically are not known in the systems by the victim and are simply viewing all of the data passing through the network. Passive attacks are mostly threats to the confidentiality of data, where active attacks are attacks on integrity and availability. 

What Does This Mean for my SMB?

In order to protect against active and passive attacks, it’s vital that you have some sort of Antivirus/Antimalware solution in place to help reduce the likelihood of exploitation. CyberHoot also recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot

To learn more about Active Attacks, watch this short video:

Sources: TechTarget, YouTube

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more