Cyberattacks

image

Phishing attack

Ransomware

Denial-of-Service(DoS)

Man-in-the-Middle(MitM)

SQL Injection

Cross-Site Scripting(XSS)

Zero-Day Exploits

DNS Spoofing