The document discusses trends in cyber threats such as ransomware, coin mining malware, and supply chain attacks. It notes that while the average ransom demand has decreased in recent years, the number of new ransomware variants has increased by 46%. It also explains how supply chain attacks can be difficult to detect as trusted processes are hijacked, and how these attacks may target specific regions, sectors, or isolated industrial environments by leveraging trusted channels. Examples of notable recent attacks discussed include Butterfly, Petya/NotPetya, Dragonfly, and those attributed to the Lazarus group.