Manipulation or detour of humanitarian aid for malicious purposes
State actors or armed groups seeking access to information to influence or control humanitarian operations
Cyber-espionage to obtain information about organizations' activities, strategies, partners and funding sources
Disclosure of sensitive information about beneficiaries, jeopardizing their safety and privacy
Internal threats from disgruntled employees, infiltrated volunteers, or partners with ulterior motives that can compromise organizational systems and data