Malware. Denial-of-Service (DoS) Attacks. Phishing. Spoofing. Identity-Based Attacks. Code Injection Attacks. Supply Chain Attacks. Insider Threats.