Crash Course in How Cyberattacks Start
February 26, 2019
Today, most people are aware of the abstract threat of cyber attacks from the news or company training, or worse, know first-hand how harmful they are because their systems were breached. However, what many people do not know is how the execution of an actual attack starts, how it progresses and how it can persist. To give some insight into this, first we need to distinguish between targeted and untargeted attacks. Many breaches in IT security are, surprisingly, the latter. What this means in practice is that the attacker is not trying to deliberately hurt a specific business or company, but instead simply browsing through the Internet, looking for vulnerable components that have been accidentally left exposed. Read more at IndustryWeek.