Answers
An individual targeting their former partner's business with malicious online activities
A hacker group infiltrating a well-protected corporate website to boast about their abilities
A company hacking a competitor to steal trade secrets or new product designs
Ethical hackers participating in a company-sponsored hacking event to improve system security
Hackers accessing personal information from a healthcare provider's system for identity theft
An individual spying on a former employer to provide confidential information to a new employer
Security researchers finding vulnerabilities in software for bug bounties
Cybercriminals deploying ransomware to lock a company's data and demand payment for its release
Attackers threatening to leak sensitive data unless a large sum of money is paid
A disgruntled former employee launching a cyberattack to disrupt their ex-employer's operations
Organised criminals stealing credit card information from a retail database
Competitors conducting DDoS attacks to disrupt each other's online services
A skilled teenager hacking into a school's website to display a prank message
Hacktivists defacing a government website to protest a policy