Malware, such as ransomware, botnet software, RATs (remote access Trojans), rootkits and bootkits, spyware, Trojans, viruses, and worms.
Backdoors, which allow remote access.
Formjacking, which inserts malicious code into online forms.
Cryptojacking, which installs illicit cryptocurrency mining software.
DDoS (distributed denial-of-service) attacks, which flood servers, systems, and networks with traffic to knock them offline.
DNS (domain name system) poisoning attacks, which compromise the DNS to redirect traffic to malicious sites.