Skip to content
    Request A Free Trial
    cyber security

    What is a Cyber Attack?

    A cyber attack is an attempt to gain unauthorized access to a computer system or network. The purpose of a cyber attack is to disrupt, disable, destroy, or maliciously control a computer system or infrastructure.

    Who should care about cyber attacks?

    Organizations are concerned with cyber attacks because they disrupt business operations, and cause a loss of customer data, intellectual property, or both. Individuals are concerned about cyber attacks on themselves and organizations they do business with because cyber attacks typically result in their personal information being stolen.

    In all instances, cyber attacks cause significant financial harm to those involved.

    What are the most common types of cyber attacks?

    While there are many ways that cyber criminals will carry out an attack on an organization, most cyber attacks follow a similar pattern of attack techniques. Some of the most common types of cyber attacks are:

    • Malware
    • SQL injection
    • Zero-day exploit
    • Phishing
    • Distributed Denial of Service attacks (DDoS)
    • Man in the middle (MITM)
    • DNS tunneling
    • Business email compromise (BEC)
    • IoT-based attacks
    • Password attack
    • Cross-site scripting attacks (XSS)

    See the Platform

    See the Axonius Platform for yourself with an interactive product tour, where we'll guide you through key applications of our Cybersecurity Asset Management and SaaS Management solutions.

    Get a Free Trial

    Sign-up for a free full-access 30 day trial to learn how Axonius gives IT and security teams a comprehensive understanding of all assets, their relationships, and business-level context including devices, identities, software, SaaS applications, vulnerabilities and security controls, and more.

    Book a Demo

    Request a demo to learn how the Axonius Platform provides a system of record for all digital infrastructure helping IT and security teams manage an always-expanding sprawl of devices, users, software, SaaS applications, cloud services, and the tools used to manage and secure them.