In this video, you will learn to describe and name the major cybercrime and hacker organizations that are now operating worldwide. Organizations, hacker organization, crime organization, and hacktivism organization. For example, we have the Fancy Bears. That organization was been collated with US election hack. DCC hack into Hillary Clinton party, the office that manage information from Democratic Party. Then we have for example, the Laser group, that's actually pretty good image here. We have a Anonymous, obviously. We have Look Sec. We have the Syrian Electronic Army. We have Guardians of the Peace, that's another hacker group that caused some leaks on Sony. I don't know if you remember that, but a couple of years ago, Sony create or film a movie regarding North Korea dictator, Kim Jong Un and Guardians of Peace hacked Sony in order to prevent the release of the movie. So that's the story behind Guardians of Peace. Then we have another set of actors. Those are government actors. For example, we have obviously the Tailor Access Operation for the United States. We have the National Security Agency, NSA. We have Unit 61398 from Israel. We have the Unit 8200 from China. So we have a lot of people. We have a lot of actors in the security, on the cybersecurity field, in cybersecurity arena. Obviously, we don't have here business sectors. We don't have the security operation centers. We don't have the companies that are just part of the cybersecurity ecosystem at this stage. What's next? Probably the spy, the espionage from countries from different actors will be increased. Advanced malware, we will have a lot of new malware. We will have a lot of more advanced malware. There is a couple of new malware examples that we already have and we are exploring. We are trying to understand how that malware works. That actually didn't use the normal methods to hire. We didn't use any common methods, any no method to deliver or to exploit vulnerabilities into the system. We're going to have new technologies. We're going to have new smartphones, new operating systems, new devices that will be part of the technological ecosystem. So as soon as we have a new technology, there are new security box, security vulnerabilities that we need to carry out in order to protect those assets, in order to protect that technology. We're going to have a lot of hacking, a lot of advanced persistent threats and we're going to talk about the advanced persistent threats in the next videos. But we are going to have a lot hacking in the next following year. We're going to have or we have actually a human gap. The human needs to understand that the cybersecurity is something important. They need to carry about data that they are having on the Internet, they having on the on their personal devices. So the human gap will be increased, but that's something that we need to deal with and work with the users to decrease that gap.