Cyber Threats

The answer my vary by country, area of Industry / Goverment, or Critical Infrastructure.
APT for sure. Ransomware are a pain, since they copy data before.
Social Engineering with insider threats will work as long people access data.
Depending on the Source:

10. Supply Chain Attacks​

9. Man-in-the-Middle (MitM) Attacks (on Path)​

8. Distributed Denial of Service (DDoS) Attacks​

7. Malware​

6. Insider Threats​

5. Advanced Persistent Threats (APTs)​

4. Internet of Things (IoT) Attacks​

3. Cloud Vulnerabilities (Crowd strike, Microsoft Master Key Azure Problem)​

2. Ransomware Attacks​

1. Social Engineering and Phishing​


i can agree to that list. and some threats are connected..
And since the World turns more back to blocks, Cyber Warefare against Critical infrastructure and Political Influence with Voting...

Just my 2c

Michael
 
The users

Aside from the users, here is a great list

 
The answer my vary by country, area of Industry / Goverment, or Critical Infrastructure.
APT for sure. Ransomware are a pain, since they copy data before.
Social Engineering with insider threats will work as long people access data.
Depending on the Source:

10. Supply Chain Attacks​

9. Man-in-the-Middle (MitM) Attacks (on Path)​

8. Distributed Denial of Service (DDoS) Attacks​

7. Malware​

6. Insider Threats​

5. Advanced Persistent Threats (APTs)​

4. Internet of Things (IoT) Attacks​

3. Cloud Vulnerabilities (Crowd strike, Microsoft Master Key Azure Problem)​

2. Ransomware Attacks​

1. Social Engineering and Phishing​


i can agree to that list. and some threats are connected..
And since the World turns more back to blocks, Cyber Warefare against Critical infrastructure and Political Influence with Voting...

Just my 2c

Michael
Michael, your 2cents is more like a dollar!!! Thank you for your input!!!
 
  • Like
Reactions: Michael Schmitz
The users

Aside from the users, here is a great list

Poor users :) Thanks Gregory for the OWASP link!!!
 
I started this Monday ritual a couple of years ago. If there is a Monday holiday, it shifts to Tuesday morning.

The first thing I do is check for any updates to the software I use on my business systems. That's Windows 10 and 11 Pro AND a list of applications that I rely on. I also check my cloud accounts at AWS, Google, and Azure (in that order). The next thing I do is look at the NVD dashboard at https://nvd.nist.gov/general/nvd-dashboard.

Some students have asked why I look at the NVD early in the week since the site reports the number of CVEs filed weekly. I'm focused on 'This Month,' 'Last Month,' and 'This Year' data. I view the daily or weekly data as insignificant because it fluctuates wildly. I also look at the 'Last 20 scored..' data to see if any of the software or solutions I use have recently posted or updated CVEs.

My next stop is the KEV Catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog . The Known Exploited Vulnerabilities Catalog is an intel data source that didn't make the Security+ SY0-701 objective cut (much to my disappointment). The KEV Catalog is an extremely valuable tool to identify what vulnerabilities threat actors are using now.

I maintain a list of software I use in a spreadsheet (with the Support URL and end date if the software is licensed) and keep telling myself that I should spend the time to automate this process. I haven't gotten around to that yet.

So, my long answer to Professor Chandler's question about the top cyber threats is 'the ones that can hurt me.'