Attacker

26th December 2019 | Cybrary Attacker
Image Source

An Attacker is an individual, group, organization, or government that executes an attack.  Not to be confused with a vulnerability.  An attack in the physical world might be someone who jumps out of the bushes to rob you with a knife. Whether you are vulnerable to the threat (the actor holding a knife) depends on whether you have significant martial arts experience.  If you are a Black belt in Karate, you might not be vulnerable to the threat.  If the threat is a gun instead of a knife, perhaps you become vulnerable.

In the same way, online threats are hacker organizations.  They hack with many different tools and methods.  Whether you are vulnerable depends upon you and your company’s preparations.  Are your systems patched? Do you train and govern your staff on common attack methods so they can be spotted and deleted before causing a problem?

Related Term: Attack, Active Attacker, Exploit. Passive Attacker, Risk, Risk Management, Threat, Vulnerability

Synonym: Threat, Threat Actor

Source: Barnum & Sethi (2006), NIST SP 800-63 Rev 1

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more
Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more