Malware
This includes viruses, worms, trojans, ransomware, spyware, adware,
and other malicious software designed to damage, disrupt or gain
unauthorized access to computer systems.
Social engineering
This involves manipulating people into breaking security procedures
by using deception techniques such as pretexting (lying about one's
identity) or baiting (offering an irresistible proposition).
DDoS attacks
These are distributed denial of service attacks where attackers
flood a target with traffic, overwhelming their infrastructure and
causing it to go offline.
Ransomware
This type of malware encrypts a user's files and demands payment for
the decryption key, making it difficult or impossible for the victim
to regain access to their data without paying the ransom.
Exploits
Attackers may exploit known vulnerabilities in software, operating
systems, applications, or hardware to gain unauthorized access,
steal data, or execute malicious code.
IoT attacks
Cybercriminals may target Internet of Things (IoT) devices such as
smart TVs, home assistants, and cameras due to their widespread use
and the potential vulnerability of many IoT products.