Attacker

26th December 2019 | Cybrary Attacker
Image Source

An Attacker is an individual, group, organization, or government that executes an attack.  Not to be confused with a vulnerability.  An attack in the physical world might be someone who jumps out of the bushes to rob you with a knife. Whether you are vulnerable to the threat (the actor holding a knife) depends on whether you have significant martial arts experience.  If you are a Black belt in Karate, you might not be vulnerable to the threat.  If the threat is a gun instead of a knife, perhaps you become vulnerable.

In the same way, online threats are hacker organizations.  They hack with many different tools and methods.  Whether you are vulnerable depends upon you and your company’s preparations.  Are your systems patched? Do you train and govern your staff on common attack methods so they can be spotted and deleted before causing a problem?

Related Term: Attack, Active Attacker, Exploit. Passive Attacker, Risk, Risk Management, Threat, Vulnerability

Synonym: Threat, Threat Actor

Source: Barnum & Sethi (2006), NIST SP 800-63 Rev 1

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more