Answers
Hacktivists defacing a government website to protest a policy
Competitors conducting DDoS attacks to disrupt each other's online services
Organised criminals stealing credit card information from a retail database
Ethical hackers participating in a company-sponsored hacking event to improve system security
An individual spying on a former employer to provide confidential information to a new employer
A company hacking a competitor to steal trade secrets or new product designs
A disgruntled former employee launching a cyberattack to disrupt their ex-employer's operations
An individual targeting their former partner's business with malicious online activities
A skilled teenager hacking into a school's website to display a prank message
Security researchers finding vulnerabilities in software for bug bounties
Cybercriminals deploying ransomware to lock a company's data and demand payment for its release
Attackers threatening to leak sensitive data unless a large sum of money is paid
Hackers accessing personal information from a healthcare provider's system for identity theft
A hacker group infiltrating a well-protected corporate website to boast about their abilities