Threat actors exploit vulnerabilities in computer systems, networks and software to perpetuate various cyberattacks, including phishing, ransomware and malware attacks. Today, there are many types of threat actors, all with varying attributes, motivations, skill levels and tactics.