NEW

3 Cybersecurity Predictions for 2025

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right
Warp Graphic

Cyberattack Glossary

Network attacks are techniques used by threat actors to achieve goals in their target infrastructure. Learn how these attacks work and what you can do to protect against them.

Decryption enhanced

Brute Force Attack

Detection Supported

A brute force attack is a trial-and-error attack method to guess a password, encryption key, or hidden webpage. See brute force attack examples.

C2 Beaconing

Detection Reported

Learn how to detect C2 beaconing. C2 beaconing is a method of command and control communication between malware-infected hosts (like those that make up botnets) and the controlling server.

Cryptomining Malware

Detection Supported

Cryptomining malware, or 'cryptojacking,' is a malware attack that co-opts the target's computing resources in order to mine cryptocurrencies like bitcoin.

Decryption enhanced

DCSync Attack

Detection Supported

A DCSync attack uses commands in MS-DRSR to pretend to be a domain controller (DC) in order to get user credentials. Learn more and see examples of attacks.

Decryption enhanced

DNS Tunneling Attack

Detection Supported

DNS tunneling routes DNS requests to the attacker's server, providing attackers a covert command and control channel. Learn more and see DNS tunneling examples.

Denial of Service Attack

Detection Supported

Denial of service (DoS) & distributed denial of service (DDoS) attacks overload a machine or network to make it unavailable. Learn how to respond to an attack.

Decryption enhanced

HTTP Request Smuggling

Detection Supported

HTTP request smuggling attack takes advantage of inconsistencies in how servers process requests from multiple senders. Learn more and see examples.

Malware Obfuscation

Detection Supported

What is Malware Obfuscation? See techniques, history of attacks, and effective detection methods.

Port Scan Attack

Detection Supported

Port scanning attackers scope out their target environment by sending packets to specific ports on a host and using the responses to find vulnerabilities.

Decryption enhanced

Ransomware Attack

Detection Supported

Ransomware is a type of malicious software which encrypts files, making them inaccessible until a ransom is paid. Learn more and see examples.

Remote Code Execution (RCE)

Detection Supported

What are RCE Attacks and Vulnerabilities? See attack examples, history of attacks, and effective methods to protect enterprise organizations.

Decryption enhanced

Remote Services Exploitation

Detection Supported

Attacks like RDP exploitation hijack remote access tools to access a network's internal systems. Learn more and see examples.

Decryption enhanced

SQL Injection (SQLi) Attack

Detection Supported

By injecting an SQL command into a data entry field, attackers communicate directly with your database. Learn more and see examples such as RDP exploitation.

Supply Chain Attacks

Detection Supported

What is a supply chain attack? Types of supply chain attacks, history of attacks, and effective methods to protect enterprise organizations.

Decryption enhanced

XSS Attacks

Detection Supported

Learn about cross-site scripting (XSS) attacks and the top three ways to prevent an attack. See risk factors and examples.