Skip to content
LOGO WHITE SKINNY-1

ICE's CYBER ATTACK RESOURCE CENTER

hacker-4357096-3618811
ICEs Little Black Book of Cyber Attacks

ICE's Little Black Book of Cyber Attacks

Covid has eased, but the Cyber Pandemic thrives as remote work becomes permanent. Awareness of breaches is crucial for data protection. Check out our guide, the Little Black Book of Cyber Attacks, detailing common methods in 2024. You can download the full guide here or the tailored summaries for each type of attack.

Download
Binary Applications Attacks

Binary Applications Attacks

Binary planting is a general term for an attack where the attacker places (i.e., plants) a binary file containing malicious code to a local or remote file system in order for a vulnerable application to load and execute it.

Download
Adversarial AI Attacks

Adversarial AI Attacks

When attempting to safeguard large or complex environments, artificial intelligence (AI) is a very helpful tool for cybersecurity. AI can assist in identifying unusual or questionable behavior so that analysts can further investigate it. AI may be used for more sinister goals like detecting security flaws and ways to get beyond protection, though, just like many other cybersecurity tools.

Download
Crypto Graphic Attacks

Crypto Graphic Attacks

A cryptographic attack, also known as cryptanalysis, is when a threat actor finds weaknesses in a cryptographic system's code, cipher, key management scheme, or cryptographic protocol to bypass its security. Here are some types of cryptographic attacks:

Download
Domain Name System Attacks

Domain Name System Attacks

A Domain Name System (DNS) attack is when cybercriminals exploit vulnerabilities in a server's DNS to achieve their goals. The DNS translates domain names into IP addresses, which are machine-readable.

Download
Influence Campaign Attacks

Influence Campaign Attacks

Large-scale initiatives called influence campaigns aim to sway public opinion. Such tactics frequently aim to spread a misleading narrative and are typically conducted with evil intent. Groups with high degrees of competence, up to and including nation-state actors, frequently carry out these activities.

Download
Layer 2 Attacks

Layer 2 Attacks

Layer 2 Attacks involve unauthorized surveillance of data traffic on networks to gather sensitive information. The attacker silently monitors the network, intercepting data packets and analyzing their content. This kind of attack is dangerous because they can be executed without altering the data, making them hard to detect.

Download
Malware Attacks

Malware Attacks

Malware is a harmful self-replacing program that fixes itself to other programs and executables without the user's consent is known as a virus. Data on the computer might be altered or deleted by a downloaded virus.

Download
Physical Attacks

Physical Attacks

It's no longer true to think of the digital world created by computers as being in a vacuum from the real one. Since computers are tangible objects, physical assaults may be possible against them. Attackers may physically interact with the computer during these attacks, or they may use physical objects like flash drives or smartcards.

Download
Phishing Attacks

Phishing Attacks

Phishing uses humans as its initial attack vector, whether it's employed to mislead a victim into paying money, collect login information, or download malware. Whom it targets is another way to classify phishing. In an effort to catch a victim in a large net, many phishing efforts send out bulk spam emails to people and organizations.

Download
Supply Chain Attacks

Supply Chain Attacks

A technique used by attackers to breach one computer and then use it to compromise another is known as pivoting in the field of cybersecurity. The similar concept underlies supply chain attacks, which utilize businesses as opposed to solitary computers.

Download
Web Applications Attack

Web Applications Attack

Web applications are sought after because they are visible, easily accessible, and provide a wide range of possible rewards for attackers. Due to the popularity of web applications as targets, groups like the Open Web Application Security Project (OWASP) have been established to inform people about protecting web apps.

Download
Social Engineering Terms

Social Engineering Terms

Social Engineering encompasses a wide array of methods and approaches, making it a complex and multifaceted field. This comprehensive guide delves into every possible attack scenario, providing you with an in-depth understanding of all the deceptive tactics employed by malicious actors. By equipping yourself with this knowledge, you can better defend against and mitigate the risks associated with social engineering attacks.

Download
Social Engineering Attacks

Social Engineering Attacks

Like hacking, social engineering has core principles applied in various ways to manipulate a target. While the core principles in hacking exploit the design of our technologies, the principles used in social engineering exploit our cognitive biases and social norms.

Download
Social Engineering of Emails

Social Engineering of Emails

Spam, or sending unsolicited emails, is a very successful social engineering tactic. Most spam emails that land in our inboxes are blatantly false, and this is done on purpose because the scammers who send them are looking for easy victims who lack the intelligence to spot schemes. Even though fewer individuals will open the email, those who do are more likely to fall for a scam.

Download

Click the link to learn more about our cybersecurity services

Cybersecurity Services-1

Any current cybersecurity concerns?

Connect with our cybersecurity professionals today for a free consultation

ICE's Managed IT & Cybersecurity Services

We have everything needed to support your  life science organization from inception to commercialization

Click on the image to learn more about that service