- Phishing Attacks: Fraudulent attempts to obtain sensitive information by disguising as trustworthy entities. - Ransomware: Malicious software that encrypts data, demanding a ransom for its release. - Insider Threats: Employees misusing access to data, either intentionally or unintentionally. - Malware: Software designed to disrupt, damage, or gain unauthorized access to computer systems.