Page 319 - Cyber Defense eMagazine September 2025
P. 319

Threat Actor Profiling


            The art of uncovering adversaries


            By Diyar Saadi, Computer Security Researcher, Independent Researcher


            Who are the Threat Actors? When it comes to cybersecurity, threat actors aren’t always external to the
            organization; they could be internal or made by the organization itself. There are some cases in which
            threat  actors  lie  in  our  actions  or  systems.  Click  incursions,  for  example,  by  Jerey’s  from  an  email
            attachment, may lead to ransomware attacks, which could entrap the entire network of an organization.
            This  example  accentuates  the sophistication  surrounding  cybersecurity  issues  in  the  present.  Cyber
            threat  actors  are  users,  groups,  or  organizations  that  initiate  cyberattacks.  These  attacks  may  be
            rendered to damage, disrupt, illicit, or transact business, and in some cases, cyber terrorism which can
            be for political, social, or ideological motives. In the past, attacks were executed out of boredom and for
            fun.  Today,  cyber  attackers  are  much  quieter  and  the  ways  in  which  they  strike  have  advanced
            immensely.






            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          319
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   314   315   316   317   318   319   320   321   322   323   324