Answer:
Social engineering. ...
Ransomware. ...
DDoS attacks. ...
Third party software. ...
Cloud computing vulnerabilities.
Explanation:
carry on learning po