This document discusses several common cybersecurity threats and risks: human nature, malware, phishing attacks, formjacking, inadequate patch management, outdated hardware and software, and man-in-the-middle attacks. It provides examples of data breaches and attacks that have occurred due to these threats. The key concepts covered are that threats become risks when they exploit vulnerabilities, and that risks are defined as the probability and impact of a threat occurring.
Related topics: