We will review, through real-world examples, some of the recent trends in identity-related threats and operations, aiming to conclude with lessons that can be applied to improve identity security strategies and better prepare for the future.