Page 319 - Cyber Defense eMagazine September 2025
P. 319
Threat Actor Profiling
The art of uncovering adversaries
By Diyar Saadi, Computer Security Researcher, Independent Researcher
Who are the Threat Actors? When it comes to cybersecurity, threat actors aren’t always external to the
organization; they could be internal or made by the organization itself. There are some cases in which
threat actors lie in our actions or systems. Click incursions, for example, by Jerey’s from an email
attachment, may lead to ransomware attacks, which could entrap the entire network of an organization.
This example accentuates the sophistication surrounding cybersecurity issues in the present. Cyber
threat actors are users, groups, or organizations that initiate cyberattacks. These attacks may be
rendered to damage, disrupt, illicit, or transact business, and in some cases, cyber terrorism which can
be for political, social, or ideological motives. In the past, attacks were executed out of boredom and for
fun. Today, cyber attackers are much quieter and the ways in which they strike have advanced
immensely.
Cyber Defense eMagazine – September 2025 Edition 319
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.