{"id":2687,"date":"2025-04-07T08:32:35","date_gmt":"2025-04-07T06:32:35","guid":{"rendered":"https:\/\/enthec.com\/?p=2687"},"modified":"2025-04-07T10:06:41","modified_gmt":"2025-04-07T08:06:41","slug":"common-types-of-cyberattacks-part-ii","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/","title":{"rendered":"Common Types of Cyberattacks &#8211; Part II."},"content":{"rendered":"<p><span data-contrast=\"none\">Computer security is a fundamental pillar for companies and individuals. Technological advances have facilitated the digitization of many processes but have also <\/span><b><span data-contrast=\"none\">opened the door to new risks.<\/span><\/b><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Knowing the <\/span><b><span data-contrast=\"none\">most common types of cyberattacks<\/span><\/b><span data-contrast=\"none\"> is key to preventing them and minimizing their consequences. This is not only about protecting personal data but also about preventing companies and institutions from suffering attacks that could affect their operations and reputation.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Advanced surveillance and security management tools are essential to dealing with these threats. In this sense,\u00a0<strong>Kartos<\/strong> offers\u00a0a solution specialized in <\/span><b><span data-contrast=\"none\">Continuous Threat Exposure Management (CTEM).<\/span><\/b><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">We\u00a0<\/span><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>monitor and analyze<\/strong><\/span><b><span data-contrast=\"none\">\u00a0vulnerabilities, detecting information leaks and security breaches before cybercriminals can exploit them.<\/span><\/b><\/p>\n<p>&nbsp;<\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">What is a cyberattack, and how many types are there?<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">We call a cyberattack any <\/span><b><span data-contrast=\"none\">type of offensive maneuver used by individuals or entire organizations<\/span><\/b><span data-contrast=\"none\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>\u00a0that targets computer systems, infrastructures, computer networks, and\/or personal computer devices.<\/strong> These attacks attempt to hack into a system through one or more digital acts, usually originating from an anonymous source,\u00a0<\/span>to steal, alter, or destroy a specific target.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">There are different <\/span><b><span data-contrast=\"none\">types of cyberattacks<\/span><\/b><span data-contrast=\"none\">, which can be classified according to their method of attack or the purpose they pursue. Below, we explain the most frequent and dangerous ones.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-large wp-image-2682 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/kartosXTI-vulnearabilidades-1024x574.png\" alt=\"Common Types of Cyberattack\" width=\"840\" height=\"471\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/kartosXTI-vulnearabilidades-1024x574.png 1024w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/kartosXTI-vulnearabilidades-300x168.png 300w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/kartosXTI-vulnearabilidades-768x430.png 768w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/kartosXTI-vulnearabilidades-350x196.png 350w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/kartosXTI-vulnearabilidades.png 1115w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Main types of cyberattacks<\/span><\/b><\/h2>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Ransomware<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">This attack has become one of the most devastating threats in recent years. Ransomware <\/span><b><span data-contrast=\"none\">encrypts files on a device or an entire network<\/span><\/b><span data-contrast=\"none\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>\u00a0and<\/strong> demands<\/span>\u00a0payment to restore access.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Victims often <\/span><b><span data-contrast=\"none\">receive threatening messages stating that if they do not pay the ransom within a specific time, they will lose their data forever.<\/span><\/b><span data-contrast=\"none\"> However, paying does not guarantee the recovery of the information and, in addition, finances the attackers to continue operating.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">Phishing <\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Malware<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Malware is any type of software that intentionally <strong>performs malicious actions on a system without the user&#8217;s knowledge<\/strong>. Viruses, worms, and Trojan horses are different types of malware.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Within malware, we find several categories:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"none\">Virus<\/span><\/b><span data-contrast=\"none\">. A computer virus is a small script of code that, when executed, replicates itself by modifying other computer programs, which are called hosts, and inserting its own code to alter a computer&#8217;s operation. Of course, since this is a type of malware, all of this is done without the user&#8217;s permission or knowledge.<\/span><\/li>\n<li><b><span data-contrast=\"none\">Worms. <\/span><\/b><span data-contrast=\"none\">A computer worm is a standalone malware program that replicates itself to spread to other computers. This differs from a virus because the virus needs a host program, but the worm does not. A worm often uses a computer network to spread, relying on security flaws in the target computer to gain access to it. Once there, it will try to scan and infect other computers.<\/span><\/li>\n<li><b><span data-contrast=\"none\">Trojan Horse<\/span><\/b><span data-contrast=\"none\">. A Trojan horse virus is a type of malware that is downloaded onto a computer disguised as a legitimate program. It is usually hidden as an attachment in an email or a free download file and then transferred to the user&#8217;s device. Once downloaded, the malicious code will execute the task the attacker designed it to do, such as spying on users&#8217; online activity or stealing sensitive data.<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Malware can <\/span><b><span data-contrast=\"none\">compromise everything from individual computers to large business networks, causing financial losses and operational problems.<\/span><\/b><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\"><img decoding=\"async\" class=\"alignnone size-full wp-image-3585\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2023\/12\/ciberataque-virus-1024x683-1.jpg\" alt=\"virus cyberattack\" width=\"1024\" height=\"683\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2023\/12\/ciberataque-virus-1024x683-1.jpg 1024w, https:\/\/enthec.com\/wp-content\/uploads\/2023\/12\/ciberataque-virus-1024x683-1-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2023\/12\/ciberataque-virus-1024x683-1-768x512.jpg 768w, https:\/\/enthec.com\/wp-content\/uploads\/2023\/12\/ciberataque-virus-1024x683-1-350x233.jpg 350w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/span><\/b><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Phishing <\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Phishing is a method of <\/span><a href=\"https:\/\/enthec.com\/en\/social-engineering-attacks-on-senior-executives\/\"><span data-contrast=\"none\">social engineering<\/span><\/a><span data-contrast=\"none\"> in which <\/span><b><span data-contrast=\"none\">attackers impersonate legitimate entities <\/span><\/b><span data-contrast=\"none\">(banks, businesses, or online services) to trick victims into obtaining sensitive information.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Phishing emails often include links to fake web pages that mimic the real thing. When the victim enters their data, cybercriminals steal it and use it to access bank accounts, emails, or corporate networks.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Phishing attacks have evolved<\/span><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">, and there are now more sophisticated variants, such as\u00a0<a href=\"https:\/\/enthec.com\/en\/what-is-spear-phishing-5-keys-to-protect-your-business\/\" target=\"_blank\" rel=\"noopener\">spear phishing<\/a>, which is aimed at specific targets within a company, and\u00a0<a href=\"https:\/\/enthec.com\/en\/whaling-the-attack-that-targets-senior-executives-and-keys-to-avoid-it\/\" target=\"_blank\" rel=\"noopener\">whaling,<\/a>\u00a0<strong>which is <\/strong><\/span><b><span data-contrast=\"none\">focused on managers and senior managers<\/span><\/b><span data-contrast=\"none\">. <\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If you want to learn more about this cyberattack, access our post\u2192 <\/span><a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"><span data-contrast=\"none\">Phishing: what it is and how many types there are.<\/span><\/a><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Denial-of-service (DDoS) attacks<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Distributed denial-of-service (DDoS) <\/span><b><span data-contrast=\"none\">attacks<\/span><\/b><span data-contrast=\"none\"> seek to overload a website or online service&#8217;s servers by sending a massive volume of fake traffic. As a result, the servers stop working correctly, preventing access to legitimate users.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These attacks can be used to <\/span><b><span data-contrast=\"none\">extort money from companies<\/span><\/b><span data-contrast=\"none\">, causing economic losses and damaging the reputation of the affected company.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Spyware<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Spyware is spyware <\/span><b><span data-contrast=\"none\">installed on a device without the user&#8217;s knowledge.<\/span><\/b><span data-contrast=\"none\"> It aims to collect private information, such as browsing habits, passwords, or banking details.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Some spyware records everything the user types on their computer, <\/span><b><span data-contrast=\"none\">making it easier to steal credentials. <\/span><\/b><span data-contrast=\"none\">Others take screenshots or activate cameras and microphones without authorization.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Botnet<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Botnets are <\/span><b><span data-contrast=\"none\">networks of infected devices that cybercriminals use to carry out massive attacks. <\/span><\/b><span data-contrast=\"none\">These devices, called bots, can be personal computers, servers, or IoT (Internet of Things) devices, such as security cameras or smart appliances.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Botnets allow attackers to <\/span><b><span data-contrast=\"none\">automate spamming, distribute malware, conduct DDoS attacks, or mine cryptocurrencies<\/span><\/b><span data-contrast=\"none\"> without the knowledge of the owners of the infected devices.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Man-in-the-Middle (MitM)<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">In this attack, the <\/span><b><span data-contrast=\"none\">cybercriminal intercepts communication between two parties to spy, manipulate, or steal information.<\/span><\/b><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These attacks often occur on i<\/span><b><span data-contrast=\"none\">nsecure public Wi-Fi networks<\/span><\/b><span data-contrast=\"none\">, where attackers can capture sensitive data, such as bank account access credentials or emails.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Companies should have an <\/span><b><span data-contrast=\"none\">advanced cyber surveillance solution that allows detecting and mitigating threats before they materialize.<\/span><\/b><\/p>\n<p>&nbsp;<\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Protect your business with Kartos <\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:320,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><a href=\"https:\/\/enthec.com\/en\/kartos\/\"><span data-contrast=\"none\">Kartos<\/span><\/a><span data-contrast=\"none\">, developed by <\/span><a href=\"https:\/\/enthec.com\/en\/\"><span data-contrast=\"none\">Enthec<\/span><\/a><span data-contrast=\"none\">, is a <\/span><b><span data-contrast=\"none\">Continuous Threat Exposure Management (CTEM) platform designed to monitor and protect organizations.<\/span><\/b><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Kartos scours all three layers of the web for vulnerabilities and breaches of corporate information, allowing companies to take preventative measures before an attack occurs. Its advanced technology provides a <\/span><b><span data-contrast=\"none\">complete view of an organization&#8217;s level of exposure, <\/span><\/b><span data-contrast=\"none\">reducing the risk of cyberattacks. <\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">To learn more about how <\/span><b><span data-contrast=\"none\">Kartos<\/span><\/b><span data-contrast=\"none\"> can help protect your business, <\/span><a href=\"https:\/\/enthec.com\/en\/contact\/\"><span data-contrast=\"none\">contact us<\/span><\/a><span data-contrast=\"none\"> and <\/span><b><span data-contrast=\"none\">learn how to stay ahead of digital threats.<\/span><\/b><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2><\/h2>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer security is a fundamental pillar for companies and individuals. Technological advances have facilitated the digitization of many processes but [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2685,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[24,32,33],"class_list":["post-2687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-cybersecurity","tag-kartos-en","tag-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Common types of cyberattacks. Part II.<\/title>\n<meta name=\"description\" content=\"A cyberattack attempts in various ways to hack a system with a specific malicious objective. We tell you here the most common ones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common types of cyberattacks. Part II.\" \/>\n<meta property=\"og:description\" content=\"A cyberattack attempts in various ways to hack a system with a specific malicious objective. We tell you here the most common ones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-07T06:32:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T08:06:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2048\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Common Types of Cyberattacks &#8211; Part II.\",\"datePublished\":\"2025-04-07T06:32:35+00:00\",\"dateModified\":\"2025-04-07T08:06:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/\"},\"wordCount\":983,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Kartos\",\"Risks\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/\",\"url\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/\",\"name\":\"Common types of cyberattacks. Part II.\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"datePublished\":\"2025-04-07T06:32:35+00:00\",\"dateModified\":\"2025-04-07T08:06:41+00:00\",\"description\":\"A cyberattack attempts in various ways to hack a system with a specific malicious objective. We tell you here the most common ones.\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"width\":2560,\"height\":2048,\"caption\":\"Abstract orange text background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common Types of Cyberattacks &#8211; Part II.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common types of cyberattacks. Part II.","description":"A cyberattack attempts in various ways to hack a system with a specific malicious objective. We tell you here the most common ones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/","og_locale":"en_US","og_type":"article","og_title":"Common types of cyberattacks. Part II.","og_description":"A cyberattack attempts in various ways to hack a system with a specific malicious objective. We tell you here the most common ones.","og_url":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-04-07T06:32:35+00:00","article_modified_time":"2025-04-07T08:06:41+00:00","og_image":[{"width":2560,"height":2048,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Common Types of Cyberattacks &#8211; Part II.","datePublished":"2025-04-07T06:32:35+00:00","dateModified":"2025-04-07T08:06:41+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/"},"wordCount":983,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","keywords":["Cybersecurity","Kartos","Risks"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/","url":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/","name":"Common types of cyberattacks. Part II.","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","datePublished":"2025-04-07T06:32:35+00:00","dateModified":"2025-04-07T08:06:41+00:00","description":"A cyberattack attempts in various ways to hack a system with a specific malicious objective. We tell you here the most common ones.","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","width":2560,"height":2048,"caption":"Abstract orange text background"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/common-types-of-cyberattacks-part-ii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Common Types of Cyberattacks &#8211; Part II."}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=2687"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2687\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/2685"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=2687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=2687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=2687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}