Your team has identified an unauthorized individual attempting to exploit a known software vulnerability before a security patch is deployed company-wide. The intruder is systematically scanning for susceptible systems and seems to have in-depth knowledge of the vulnerable software. Which type of hacker best fits the characteristics of the intruder in this scenario?
|Attacks, Threats, and Vulnerabilities
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance