Internet-Based Threats
Over the past 25 years, attackers have learned to leverage the internet to compromise the IT environments of their victims, achieve their illicit objectives and satisfy their motivations. CISOs and Security teams can inform their cybersecurity strategies by studying how attackers use the internet. In this chapter, we'll look at some of the ways attackers have been using the internet and how these methods have evolved over time.
In this chapter, we'll look at the following topics:
- Phishing attacks
- Drive-by download attacks
- Malware hosting sites
Let's get started by looking at the anatomy of a typical attack pattern.