CYBERCRIME Michelle Kantrow November 23, 2021 By simply scanning the assets or systems, threat actors can discover those that are vulnerable and therefore susceptible to attack. (Credit: Infosec Images)