The cyber threat landscape is in a constant state of flux. Cyber thieves and spies already possess tools that allow them to cost-effectively develop advanced attacks and accelerate the pace of innovation. Going forward, evasion techniques are likely to be deployed more often, helping the malware to avoid detection. Custom-developed attacks will also be deployed more readily in order to exploit unique vulnerabilities in an organizations systems.