Phishing: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity. Man-in-the-Middle Attacks: Eavesdropping on a transaction between two parties to steal or alter data. Malware: Malicious software that can steal data, corrupt files, or disrupt operations. SQL Injection: Inserting malicious SQL queries into input fields to manipulate databases.