Watering Hole Attack
Watering Hole Attack
- Home
- Cybersecurity Dictionary
- Watering Hole Attack
Watering hole attacks happen when an attacker targets a specific group of users by infecting websites they frequent with malware. Watering hole attacks are rare, but they represent a major threat since they typically target organizations through their employees, partners, vendors or unsecured wireless networks. They can also be extremely difficult to detect.
Seeking Clarity?
View the Cybersecurity Dictionary for top terms searched by your peers.

Cybersecurity, Where Art Thou?
March 06, 2018
Infosecurity Magazine | March 6, 2018 Looking at the existential crisis of when, where, and how much to invest in cybersecurity.
In The News

Cybersecurity Executives Changes
September 07, 2017
SC Media | September 7, 2017 Venafi has named Ben Golub to its board of directors. Golub is currently the executive chairman and interim CEO at Storj...
In The News
Malware
Malware
Malware (short for “malicious software”) describes any software developed for the purpose of infiltrating, damaging, disabling or seizing control of computers, computer systems, mobile devices and networks. Malware is introduced to the hardware device via several techniques, including viruses, Trojan horses, spyware and ransomware. Once implanted the malware executes in a variety of ways inimical to the targeted system’s owners. The motivation behind malware attacks is frequently, but not always, financial.
Seeking Clarity?
View the Cybersecurity Dictionary for top terms searched by your peers.
How Can We Help?
Let us know what you need, and we will have an Optiv professional contact you shortly.
Stay in the Know
For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.
Join Our Email List
We take your privacy seriously and promise never to share your email with anyone.
How Can We Help?
Let us know what you need, and we will have an Optiv professional contact you shortly.
Stay in the Know
For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.
Join Our Email List
We take your privacy seriously and promise never to share your email with anyone.