1. Malware
  2. Denial-of-Service (DoS) Attacks
  3. Phishing 
  4. Spoofing 
  5. Identity-Based Attacks
  6. Code Injection Attacks
  7. Supply Chain Attacks
  8. Insider Threats
  9. DNS Tunneling
  10. IoT-Based Attacks