What are the four types of threats?
1. Phishing and social engineering
These are the oldest and deadliest tricks in the book. Attackers will always pose as a bank, a boss, or a brand you trust. They create fake login portals or password reset pages to harvest your credentials, or they might play on your emotions and sense of urgency to pry loose credentials directly. With generative AI, phishing emails and voice deepfakes are more believable than ever before.
2. Credential-based attacks
Once an attacker has valid credentials, they can hop through networks with relative ease using real identities. Here are some examples:
Credential stuffing: Attackers reuse stolen username–password pairs from one breach across other websites and services.
Password spraying: Attackers try passwords like “Winter2025!” against thousands of accounts to see what sticks.
3. Directory and infrastructure exploits
Active Directory (AD) and cloud identity systems are juicy targets for attackers. An attacker who gains access to AD can create backdoor accounts, escalate privileges, and maintain persistence for the long term. Adversary-in-the-Middle (AiTM) attacks can also let an adversary intercept authentication tokens or session cookies in real-time.
4. Identity theft and cloning
This can include financial identity theft (opening new lines of credit), medical ID theft (billing unexpected medical treatments to someone else’s insurance), or synthetic identity creation (mixing fake and real information into a new identity).
For enterprises, this could look like fraudulent vendor accounts set up to invoice the organization. This is just the tip of the iceberg, though. Identity threats are continually evolving and mutating. But this gives you a baseline for understanding where they live.