A threat is any circumstance, event, or actor with the potential to cause harm to a system, organization, or data. In cybersecurity, threats encompass the full range of adversaries (nation-states, criminal groups, insiders), their methods (malware, phishing, exploitation), and the conditions (misconfigurations, unpatched systems) that could lead to a security incident.
In cybersecurity, a threat is anything that could exploit a vulnerability to cause harm. That includes the attacker (the threat actor), the method they use (the threat vector), and the broader conditions that make an attack possible.
The distinction between threat, vulnerability, and risk is fundamental:
You can't eliminate threats (you can't stop attackers from existing), but you can reduce vulnerabilities (patching, configuration hardening) and manage risk (prioritization, controls, insurance).
Not all threats come from the same place or carry the same motives:
A vulnerability is a weakness in your system (unpatched software, a misconfigured firewall, a hardcoded credential). A threat is something that could exploit that weakness (a ransomware group, an automated scanner, a malicious insider). Risk is what happens when the two intersect: a threat exploits a vulnerability to cause harm. Security programs address both sides: reducing vulnerabilities through patching and configuration management, and monitoring threats through threat intelligence and detection tools.
A threat model is a structured analysis of who might attack your organization, what they'd target, and how they'd do it. It identifies your most valuable assets (customer data, intellectual property, infrastructure), the threats most relevant to those assets, and the controls that reduce your risk. For startups, a simple threat model might answer: what data do we have that's valuable, who would want it, how could they get it, and what do we have in place to stop them. Formal methodologies like STRIDE and PASTA provide frameworks, but even an informal assessment is better than none.
It depends on the actor type. Cybercriminal groups are typically opportunistic: they scan for known vulnerabilities, exposed services, and weak credentials, targeting whoever is easiest to compromise. Startups with unpatched systems or misconfigured cloud services are particularly vulnerable to this category. More sophisticated actors (nation-states, advanced criminal groups) may specifically target organizations in certain industries, with certain data, or in certain supply chains. For most startups, the primary threat is opportunistic: attackers scanning for the easiest targets. This is why basic hygiene (patching, MFA, configuration management) blocks the majority of attacks.