You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Understanding how attackers operate is essential for building effective defences. This lesson covers the most common threat categories and attack techniques used in real-world cyber incidents.
Malware is malicious software designed to damage, disrupt, or gain unauthorised access to systems:
| Type | Behaviour | Example |
|---|---|---|
| Virus | Attaches to files and spreads when executed | ILOVEYOU |
| Worm | Self-replicating, spreads without user interaction | WannaCry, NotPetya |
| Trojan | Disguises itself as legitimate software | Emotet |
| Ransomware | Encrypts files and demands payment | LockBit, REvil, ALPHV |
| Spyware | Secretly monitors user activity | Pegasus |
| Adware | Displays unwanted advertisements | Fireball |
| Rootkit | Hides deep in the OS to maintain persistent access | ZeroAccess |
| Keylogger | Records keystrokes to steal credentials | HawkEye |
| Fileless malware | Lives in memory, no files on disk | PowerShell-based attacks |
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.