The cyber threat landscape is increasingly sophisticated, stemming from a diverse range of threat entities from established cybercrime organisations, malicious opportunists, and even nation-state threat actors. With a potent blend of software vulnerabilities and illusive tricks, they are finding opportunities amidst the growing complexity and interdependencies of modern IT deployments.