This document provides an overview of several cybersecurity topics: - Botnets, which are networks of compromised computers controlled remotely. They are used to launch DDoS attacks, send spam, and other malicious activities. - Watering hole attacks target specific groups by infecting websites they commonly visit. - Spear phishing attacks use targeted emails to steal sensitive information. - DDoS attacks overwhelm servers with traffic from multiple compromised systems. Detection and prevention methods are discussed for each topic.