Used words
Sub-Attacks
Deceptive
Spear
Phishing
Pharming
Whaling
Clone
Angler
Popup
Pharmacy
Brand
Impersonation
Seasonal
Watering
Hole
Ransomware
via
Email
Spam
with
Embedded
Malware
Viruses
Keyloggers
Worms
Trojan
Horses
Spyware
Rootkits
Fileless
Cryptojacking
Wiper
Adware
Exploit
Kits
Botnets
Advertising
Scam
Emails
Hoax
and
Chain
Letters
Job
Offer
Financial
Opportunity
Spoofing
CEO
Fraud
Account
Compromise
False
Invoice
Scheme
Attorney
Data
Theft
Session
Hijacking
Wi-Fi
Eavesdropping
DNS
Compromised
Router
or
Network
Equipment
SSL
Stripping
Use
of
Supply
Attacks
Social
Engineering
Advanced
Persistent
Threats
Accidental
Sharing
Misconfigured
Servers
Exfilteraion
Intentional
Credential
in
DDoS
Resource
Exhaustion
BruteForce
Password
Spraying
Stuffing
Hijacking:
Mass
Mailing
List
Linking
Zip
Bombing
Looping
Botnet-based
Spamming
Using
Open
Relays
Script
Backdoor
Installation
Exfiltration
Lateral
Movement
Command
Control
(C2)
Communications
Pretexting
Baiting
Quid
Pro
Quo
Media
Profiling
Obfuscated
URLs
Typosquatting
Homograph
Attacks:
Redirects
Tracking
Malicious
Attachments
Documents
Executable
Files
Archive
Image
Shortcut
Double
File
Extensions
Zero-Day
Exploits
Create your own