Common attack vectors and exploitation: by Iddrisu Lampaku(CyberSecurity Analyst)

This is a satirical website. Don't take it Seriously. It's a joke.

2059 86799 Shares

Ladies and gentlemen, As Hackers gets smart and sophisticated due to the tools they currently have in their “arsenal” gives them the leverage to gain access to a network server. As noted earlier Advanced Persistent Threat adversaries(hackers) also runs highly targeted, multifaceted campaigns to exploit vulnerabilities either through holes in an organization's security implementation or by targeting the human element which often uses social engineering. Financially motivated actors indiscriminately send mass spam emails in credential harvesting campaigns or deploy ransomware. These attack vectors are the most common against organizations of any size, but often have a greater impact on small to medium-sized business that may not have a robust security posture.
Below are some of the common attack vectors that are commonly used by cybercriminals to deliver a payload and exploit system vulnerabilities;
* Malware(script/code)
* phishing(disguised as legitimate sender)
*Drive-by-download
* Distributed denial of service(DDoS)
* Domain shadowing
* Malvertising(Ad).

Thank you all for your time and to see next week for the next session. Iddrisu Lampaku(CyberSecurity analyst)

This is a satirical website. Don't take it Seriously. It's a joke.

loading Biewty