Targeted network/system probing of crucial systems
Compromise of important systems or data
Unauthorized use of computer systems and data
Website vandalism, intrusion, and unauthorised alterations, including the insertion of malicious code and links to other websites.
Malicious code attacks, including the dissemination of viruses, worms, trojan horses, bots, spyware, ransomware, and crypto miners
Attacks on network devices such routers and servers such as those hosting databases, mail, and DNS
Attacks involving spoofing, phishing, and identity theft
Attacks that cause a denial of service (DoS) or distributed denial of service (DDoS)
Attacks against operational technological systems, wireless networks, and vital infrastructure
Attacks against online services like e-government and e-commerce, etc.
Attacks on Internet of Things (IoT) devices and the networks, systems, software, and servers that support them
Accidents or assaults targeting electronic payment systems
Attacks made possible by nefarious smartphone apps
Accessing social media accounts without authorization
Attacks on cloud computing systems, servers, software, or apps, or other malicious or suspicious activity
Attacks or nefarious/suspicious activity affecting Big Data, blockchain, virtual assets, virtual asset exchanges, custodial wallets, robotics, 3D and 4D printing, additive manufacturing, or other systems, servers, networks, software, or applications
Attacks or nefarious/suspicious activity affecting AI and ML-related servers, software, and apps.