home_banner `

Content Icon

Overview of the Types of Cyber Attackers

September 4, 2018 | Content Aggregator - Single Slide | Threat Intelligence and Modeling

The advent of low-cost hacking tools is widening the attacker landscape. According to Swiss RE Economic Research and Consulting, the four main groups of cyber attackers are amateurs, hacktivists, organized crime and state-sponsored actors, each with different levels of resources at their disposal, motivations and sophistication levels.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Using MITRE ATT&CK™ for Coverage and Effectiveness Assessments

The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum walk through the framework’s components and how to put them to the best use when doing assessments in your organization.

Top Threat Intel Providers: An Overview

Who are the top vendors in the threat intel space? In this Ask-an-Expert live interaction, IANS Faculty Dave Kennedy provides a rundown of the top options, and explains the key features to look for when choosing a provider.

Cyber Attacks Represent Higher GDP Risk in North America than Globally

In North America, cyber attacks rank second among risks to the country’s gross domestic product. When the risks of 279 cities around the globe are averaged together, cyber attacks fall to seventh on the risk index.

Industrial Control Systems: Overview of Threat Intelligence Sources Used

Some 54 percent of companies are using third-party intelligence from their security vendors to gather threat intelligence on industrial control systems. Almost half (46%) participate in industry information-sharing partnerships.