Your team has identified an unauthorized individual attempting to exploit a known software vulnerability before a security patch is deployed company-wide. The intruder is systematically scanning for susceptible systems and seems to have in-depth knowledge of the vulnerable software. Which type of hacker best fits the characteristics of the intruder in this scenario?
Competitors
Unauthorized Hackers
Script Kiddies
Authorized Hackers