Backdoors
Cybercriminals have remote access to your systems
Cryptojacking
Or 'cryptomining' harnesses your processing power.
DDos Attacks
Disrupting systems with more requests than they can handle.
DNS Posioning
Redirects your traffic to malicious sites
Formjacking
Harvest customer card details from payment forms.
Phising
Tricking you into sharing information through emails disguised as a legitimate company.