⚠️ Security Threats & Attacks
Understand the most common cyber threats — how they work and how to defend against them.
A DDoS (Distributed Denial of Service) attack floods a server, service or network with massive amounts of traffic from many sources simultaneously, overwhelming it until it becomes unavailable to legitimate users.
Unlike a DoS (single source), DDoS uses thousands/millions of compromised devices (a botnet) making it much harder to block.
- Volume-based — Flood bandwidth with junk traffic (UDP floods, ICMP floods)
- Protocol attacks — Exploit protocol weaknesses (SYN floods)
- Application layer — HTTP request floods targeting web apps
A MITM attack occurs when an attacker secretly intercepts and possibly alters communication between two parties who believe they are communicating directly with each other.
Common scenarios:
- Attacker on public Wi-Fi intercepts your HTTP traffic
- ARP poisoning on a local network redirects traffic through attacker's machine
- SSL stripping — downgrading HTTPS to HTTP
Phishing is a cyberattack where criminals impersonate trusted entities (banks, tech companies, colleagues) via email, SMS or fake websites to trick victims into revealing passwords, credit card numbers or other sensitive information.
- Email phishing — Fake email from "your bank" with a link to a fake login page
- Spear phishing — Targeted attack personalised for specific individuals
- Smishing — Phishing via SMS text messages
- Vishing — Phishing via phone call
Ransomware is malicious software that encrypts the victim's files, making them inaccessible. The attacker then demands a ransom (usually cryptocurrency) in exchange for the decryption key.
Famous examples: WannaCry (2017), NotPetya, Colonial Pipeline attack (2021).
- Typically spreads via phishing emails with malicious attachments
- Can also exploit unpatched software vulnerabilities
- Once encrypted, files are extremely difficult to recover without the key