5

Internet-Based Threats

Over the past quarter century, attackers have learned to leverage the internet to compromise the IT environments of their victims, achieve their illicit objectives, and satisfy their motivations. CISOs and security teams can inform their cybersecurity strategies by studying how attackers use the internet. In this chapter, we’ll look at some of the ways attackers have been using the internet and how these methods have evolved over time. In this chapter, we’ll look at the following topics:

  • Phishing attacks
  • Drive-by download attacks
  • Malware hosting sites

Let’s get started by looking at the anatomy of a typical attack pattern.

Introduction

In the last two chapters, I provided a deep examination of data and trends for vulnerability ...

Get Cybersecurity Threats, Malware Trends, and Strategies - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.