Individuals/groups that purposefully carry out activities to compromise systems, steal data, or cause harm. These actors can exploit vulnerabilities in apps, networks, or devices to conduct a variety of attacks, including malware distribution, data theft, or code manipulation.
Real-World Examples
A malicious actor could exploit a vulnerability in a popular gift car and rewards app to steal personal information from consumers.