TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Common Cyber Threats

BHIS · 2026-01-21 · Read original ↗

ATT&CK techniques detected

10 predictions
T1557.001Name Resolution Poisoning and SMB Relay
93%
“credentials, credit card numbers, or identity information. - smishing uses fraudulent text messages ( sms ) to trick recipients into providing personal information or clicking malicious links. denial of service ( dos ) & distributed denial of service ( ddos ) attacks dos and ddos…”
T1190Exploit Public-Facing Application
69%
“##ing ( xss ) involves injecting malicious scripts into web pages to steal data or hijack sessions. - drive - by downloads automatically install malware on users ’ devices through compromised websites or links. - browser hijacking alters browser settings to redirect users to mali…”
T1657Financial Theft
62%
“- replicating programs that spread without user intervention, often exploiting vulnerabilities in network protocols. - trojans disguise themselves as benign software but carry malicious payloads, such as creating backdoors for remote access. - ransomware encrypts a victim ’ s dat…”
T1598Phishing for Information
56%
“threats ( apts ) apts are sophisticated, long - term cyberattacks often orchestrated by well - funded and skilled threat actors, including nation - states. these attacks aim to infiltrate and maintain access to networks to steal sensitive information or disrupt operations. social…”
T1588.001Malware
53%
“common cyber threats common cyber threats written by dieter smith, wade wells, blake regan, matthew thomas | | guest authors this article was originally published in the infosec survival guide : green book. find it free online here or order your $ 1 physical copy on the spearphis…”
T1204.002Malicious File
50%
“common cyber threats common cyber threats written by dieter smith, wade wells, blake regan, matthew thomas | | guest authors this article was originally published in the infosec survival guide : green book. find it free online here or order your $ 1 physical copy on the spearphis…”
T1598.003Spearphishing Link
49%
“threats ( apts ) apts are sophisticated, long - term cyberattacks often orchestrated by well - funded and skilled threat actors, including nation - states. these attacks aim to infiltrate and maintain access to networks to steal sensitive information or disrupt operations. social…”
T1566.002Spearphishing Link
37%
“threats ( apts ) apts are sophisticated, long - term cyberattacks often orchestrated by well - funded and skilled threat actors, including nation - states. these attacks aim to infiltrate and maintain access to networks to steal sensitive information or disrupt operations. social…”
T1684.001Impersonation
36%
“threats ( apts ) apts are sophisticated, long - term cyberattacks often orchestrated by well - funded and skilled threat actors, including nation - states. these attacks aim to infiltrate and maintain access to networks to steal sensitive information or disrupt operations. social…”
T1557Adversary-in-the-Middle
36%
“credentials, credit card numbers, or identity information. - smishing uses fraudulent text messages ( sms ) to trick recipients into providing personal information or clicking malicious links. denial of service ( dos ) & distributed denial of service ( ddos ) attacks dos and ddos…”

Summary

In today’s interconnected digital world, information security has become a critical concern for individuals, businesses, and governments alike. Cyber threats, which encompass a wide range of malicious activities targeting information systems, pose significant risks to the confidentiality, integrity, and availability of data.

The post Common Cyber Threats appeared first on Black Hills Information Security, Inc..