Bad actors, no, not the kind that permeate Hollywood cinema. I’m referring to the ones that actively seek to invade your computing systems and network infrastructure in the hopes of breaching them to obtain sensitive and critical data. Another such term is threat actor. Both are used interchangeably and are synonymous with the more globally recognized term “hacker.” Commonly known to the general masses as describing someone that steals something of value by attacking computer systems.
While we dive more deeply into the mind of a ...