[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-network-security-what-is-an-active-attack-in-cybersecurity":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":164,"categories":234},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Network Security: What is An Active Attack in Cybersecurity?","Active attacks refer to an attack on a system or network that has not yet begun.","Network Security, Active Attack in Cybersecurity","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>Active attacks refer to an attack on a system or network that has not yet begun. This type of attack is when the threat actor changes or introduces new data to a network or system to disrupt its operation.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/48-2.webp\" type=\"image/webp\">\u003Cimg alt=\"Network Security: What is An Active Attack in Cybersecurity?\" class=\"image-align-left\" height=\"188\" src=\"https://cdn.quasa.io/photos/foto-14/48-2.jpeg\" width=\"268\" />\u003C/picture>Hackers attempt to hack into servers or computers. The term &ldquo;active attack&rdquo; describes all operations that occur.&nbsp;Hackers&nbsp;who carry out active attacks instead of passive attacks are more likely to make changes to the target system.\u003C/p>\n\n\u003Cp>Passive attacks data can sometimes be used to launch active attacks. As shown in the following example. On the other hand, an active attack could be compared with &ldquo;hacking&rdquo; and a passive one to &ldquo;spying.&rdquo;\u003C/p>\n\n\u003Ch4>What Are the Types of Active Attacks?\u003C/h4>\n\n\u003Ch4>Attack of the Masks\u003C/h4>\n\n\u003Cp>To gain access to their network, the intruders pretend to be legitimate computer users. Hackers launch masquerade attacks after obtaining usernames and passwords through vulnerability exploitation or evading authentication protocols.\u003C/p>\n\n\u003Ch4>Session Replay\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/48-7.webp\" type=\"image/webp\">\u003Cimg alt=\"Network Security: What is An Active Attack in Cybersecurity?\" class=\"image-align-left\" height=\"172\" src=\"https://cdn.quasa.io/photos/foto-14/48-7.jpeg\" width=\"292\" />\u003C/picture>Session replay attacks are when&nbsp;hackers&nbsp;steal the session ID and login credentials of genuine users. This attack also called a &ldquo;replay attack&rdquo; or a playback attack, allows hackers to steal the session ID of a target user to make it appear that they are him or her in network interactions.\u003C/p>\n\n\u003Ch4>Modification to the Message\u003C/h4>\n\n\u003Cp>An attacker can alter the&nbsp;IP addresses&nbsp;in packet headers to commit message tampering. They can also alter data on the target system to gain access to a network.\u003C/p>\n\n\u003Ch4>Attack on Denial-of-Service\u003C/h4>\n\n\u003Cp>DoS attacks block users from accessing specific parts of a network. Hackers must first overwhelm the target machine with excessive traffic to launch a denial of service attack.\u003C/p>\n\n\u003Ch4>Attack on Distributed Deny of Service\u003C/h4>\n\n\u003Cp>It&rsquo;s a distributed DoS attack (DDoS), which directs traffic from botnet hacked devices to a targeted computer.\u003C/p>\n\n\u003Ch3>What can you do to prevent an ongoing intrusion?\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/48-7.webp\" type=\"image/webp\">\u003Cimg alt=\"Network Security: What is An Active Attack in Cybersecurity?\" class=\"image-align-left\" height=\"172\" src=\"https://cdn.quasa.io/photos/foto-14/48-7.jpeg\" width=\"292\" />\u003C/picture>These are the best ways to keep yourself safe from ongoing attacks.\u003C/p>\n\n\u003Cp>Randomly generate a session secret. Sessions can only be generated once per transaction. Random session keys are required to prevent malicious users from sending messages with altered content.\u003C/p>\n\n\u003Cp>One-time passwords&nbsp;can be used to authenticate transactions, agreements, and sessions between participants in communication. Even if an attacker can obtain a password, this process ensures that it will expire before it may be used again.\u003C/p>\n\n\u003Cp>A kerberos authentication protocol is used by&nbsp;Microsoft Windows&nbsp;Active Directory to verify any user&rsquo;s identity over insecure networks.\u003C/p>\n\n\u003Cp>\u003Cstrong>Also read:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/osrs-best-money-making-methods\">OSRS Best Money Making Methods\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/worried-about-the-inverter-battery-price\">Worried About the Inverter Battery Price?\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/5-reasons-why-most-entrepreneurs-succeed-in-their-business\">5 Reasons Why Most Entrepreneurs Succeed in their Business\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch4>Conclusion:\u003C/h4>\n\n\u003Cp>Engaging in active attacks is dangerous and expensive. They can also be a threat to operations and disrupt processes. Cybercriminals are attracted to computers and networks that have weaknesses. Even though users have access to many defenses, preventing attacks is still the best strategy.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","network-security-what-is-an-active-attack-in-cybersecurity","2022-05-30T17:00:51.000000Z","2022-05-30T12:30:00.000000Z","30.05.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/dPwoZu2XYA6pvPK4F6aQndyaLKEYsPal2qdr5Je7.jpg","https://cdn.quasa.io/images/news/dPwoZu2XYA6pvPK4F6aQndyaLKEYsPal2qdr5Je7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/dPwoZu2XYA6pvPK4F6aQndyaLKEYsPal2qdr5Je7.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/dPwoZu2XYA6pvPK4F6aQndyaLKEYsPal2qdr5Je7.webp","large",null,2460,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,113,125,138,151],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"GitHub’s AI Agent Tsunami: 275 Million Commits a Week, 14 Billion Projected for 2026 — And the Platform Is Starting to Crack","GitHub just hit numbers that would have sounded like science fiction twelve months ago.","github-s-ai-agent-tsunami-275-million-commits-a-week-14-billion-projected-for-2026-and-the-platform-is-starting-to-crack","2026-04-17T17:10:50.000000Z","2026-04-20T11:57:00.000000Z","20.04.2026",{"title":58,"slug":63},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.jpg","https://cdn.quasa.io/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.webp","small",6,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":118,"formatted_created_at":103,"category":119,"links":120,"view_type":110,"video_url":86,"views":14,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Time’s Up for SaaS: Grow Faster or Disappear","The public markets have spoken — and the verdict is brutal. In early 2026, the software sector is in freefall. The Meritech Public SaaS Index has plunged 37% since the end of Q3 2025.","time-s-up-for-saas-grow-faster-or-disappear","2026-04-17T16:42:27.000000Z","2026-04-20T09:32:00.000000Z",{"title":31,"slug":32},{"image":121,"image_webp":122,"thumb":123,"thumb_webp":124},"https://cdn.quasa.io/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.jpg","https://cdn.quasa.io/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.webp",{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":130,"formatted_created_at":103,"category":131,"links":132,"view_type":110,"video_url":86,"views":137,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Twitter Dev Builds “Stukach-Claw” — An AI Snitch Bot That’s Already Reported 4,250 People to the IRS for Tax Jokes","A crypto trader and developer known as @camolNFT has gone viral after revealing he built an autonomous AI agent called OpenClaw (affectionately dubbed Stukach-Claw by Russian-speaking users) that actively hunts for “jokes” about tax evasion on social media and automatically files whistleblower reports with the IRS.","twitter-dev-builds-stukach-claw-an-ai-snitch-bot-that-s-already-reported-4-250-people-to-the-irs-for-tax-jokes","2026-04-17T12:09:57.000000Z","2026-04-20T06:06:00.000000Z",{"title":19,"slug":20},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.jpg","https://cdn.quasa.io/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.webp",38,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":143,"formatted_created_at":103,"category":144,"links":145,"view_type":110,"video_url":86,"views":150,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Baidu Drops ERNIE-Image: A Compact 8B Open-Source Text-to-Image Model That Tops the Charts","Baidu has just released ERNIE-Image — a new open-weight text-to-image generator that is already turning heads in the AI community.","baidu-drops-ernie-image-a-compact-8b-open-source-text-to-image-model-that-tops-the-charts","2026-04-17T11:57:35.000000Z","2026-04-20T03:44:00.000000Z",{"title":47,"slug":48},{"image":146,"image_webp":147,"thumb":148,"thumb_webp":149},"https://cdn.quasa.io/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.jpg","https://cdn.quasa.io/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.webp",51,{"title":152,"description":153,"slug":154,"created_at":155,"publish_at":155,"formatted_created_at":156,"category":157,"links":158,"view_type":110,"video_url":86,"views":163,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":159,"image_webp":160,"thumb":161,"thumb_webp":162},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp",100,[165,178,193,205,220],{"title":166,"description":167,"slug":168,"created_at":169,"publish_at":170,"formatted_created_at":171,"category":172,"links":173,"view_type":110,"video_url":86,"views":176,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":174,"image_webp":86,"thumb":175,"thumb_webp":175},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70915,2,{"title":179,"description":180,"slug":181,"created_at":182,"publish_at":183,"formatted_created_at":184,"category":185,"links":186,"view_type":85,"video_url":86,"views":191,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":187,"image_webp":188,"thumb":189,"thumb_webp":190},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70679,4,{"title":194,"description":195,"slug":196,"created_at":197,"publish_at":198,"formatted_created_at":199,"category":200,"links":201,"view_type":110,"video_url":86,"views":204,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":202,"image_webp":86,"thumb":203,"thumb_webp":203},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68309,{"title":206,"description":207,"slug":208,"created_at":209,"publish_at":210,"formatted_created_at":211,"category":212,"links":213,"view_type":110,"video_url":86,"views":218,"likes":177,"lang":89,"comments_count":219,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":214,"image_webp":215,"thumb":216,"thumb_webp":217},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42278,1,{"title":221,"description":222,"slug":223,"created_at":224,"publish_at":225,"formatted_created_at":226,"category":227,"links":228,"view_type":85,"video_url":86,"views":233,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":229,"image_webp":230,"thumb":231,"thumb_webp":232},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41372,[235,236,237,238,239,240,241,242,243,244,245,246,247],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]