From 446032b0cbf1c1961d13f1b9b633ffaf9a91654a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Enrique=20Alcal=C3=A1=20Rojas?= Date: Wed, 14 Aug 2024 21:06:00 -0400 Subject: [PATCH] Add content to watering hole attack (#6573) * add content watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md * Update src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md --------- Co-authored-by: Kamran Ahmed --- .../content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md b/src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md index e69de29bb..e486128ec 100644 --- a/src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md +++ b/src/data/roadmaps/cyber-security/content/watering-hole-attack@dcvuKHq0nHgHLcLwtl4IJ.md @@ -0,0 +1,7 @@ +# Watering Hole Attack + +Watering Hole Attack is a type of cyberattack where the attacker targets a specific group of users by compromising a website or online resource that they are known to frequently visit. The name "watering hole" comes from the idea of predators waiting by a water source to attack prey, similar to how attackers wait for their targets to visit a compromised site. + +Visit the following resources to learn more: +- [@article@What is a watering hole attack?](https://www.techtarget.com/searchsecurity/definition/watering-hole-attack) +