Methods that malicious actors, cyber criminals, such as hackers, use to breach or infiltrate your network to deliver a malicious payload or hostile outcome. There are many different attack vectors, ranging from malware and ransomware, to man-in-the-middle attacks, compromised credentials, and phishing.
