As cybersecurity professionals, we’re keenly aware of, and interested in, recent cyber attacks. Attacks occur when someone deliberately attempts to exploit weaknesses in computer systems, networks or devices to gain unauthorized access, steal data, disrupt operations or cause damage.