Cybersecurity · Attack Categories
Browse by Threat.
Choose a threat type to explore real incidents, understand how attacks work, and learn how to defend against them.
AI & Deepfake Scams
Fraud powered by AI-generated voices, video deepfakes, and large language model impersonation.
Credential Attacks
Credential stuffing, brute force, password spraying, and stolen login data traded on dark markets.
Data Breaches
Unauthorized access to sensitive data including personal, financial, and corporate information.
Incident Response
How organizations detected, contained, and recovered from real-world security incidents.
Insider Threats
Attacks originating from employees, contractors, or partners with legitimate access to systems.
Malware & Spyware
Trojans, worms, keyloggers, and nation-state implants designed to persist, spy, and destroy.
Phishing Attacks
Deceptive emails, messages, and websites designed to steal credentials or install malware.
Physical Security
Tailgating, badge cloning, dumpster diving, and other attacks that bypass digital controls entirely.
Ransomware
Malicious software that encrypts data and demands payment for the decryption key.
Social Engineering
Psychological manipulation of people into performing actions or divulging confidential information.
Supply Chain Attacks
Compromising software or hardware at the source before it reaches the end user.
Zero-Day Exploits
Attacks exploiting vulnerabilities that vendors do not yet know about — no patch, no warning.
Looking for practical advice?
Each threat category maps to a set of security guides and recommendations.