More on Cyber Attacks Types 

There are only two types of companies, those that have been hacked and those that will be

In this page we describe known types of cyber attacks and terminology that is useful to know

Experience tells us that no  two cyber attacks are alike, the similarities are in tactics and strategy, when those have used before successfully and proven to be effective. In previous pages we discussed the various threats that lie in emails, hereunder more types of threats that are important to know.

Cybersecurity Threats and Attacks

A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw. This gap is potential to be exploited by cybercriminals. ​

What can Be done:

  • Keep the software you use up-to-date

  • The solution to fixing a zero-day attack is known as a software patch

  • When building an application make sure you add application security process into the DevOps process 

  • Check for vulnerabilities 


WannaCry used a zero-day threat to exploit a Microsoft vulnerability. The WannaCry ransomware cryptoworm, spread in more than 230,000 computers in May 2017. After infecting the WannaCry worm encrypted files on the PC's hard drive, making them impossible for users to access It took Microsoft few days to patch against Wannacry. It still remains a threat.


Distributed denial-of-service (DDoS) attack will attempt to make an online service or website unavailable by flooding it with unwanted traffic from multiple computers.

DDoS attacks are one of the biggest cyber threat. Over 50% of organizations experienced an attack in last year, It is important for us that your websites always stay open for business; Whether you’re delivering online video, web content, application or IoT data, the experience must be fast, reliable and secure


T: +31-20 823 1100

  • LinkedIn
  • Facebook


© 2020 by Magic Stone