Second-tier cyber threats