The cybersecurity landscape is evolving, driven by a reinforcing feedback loop of increasingly sophisticated attacks and defences. Threat actors, long benefitting from the asymmetrical “attacker’s advantage” of focused targeting, have now matured their organizational structures to facilitate tactical information sharing, technique specialization, the establishment of markets for buying and selling exploit and vulnerability information, and providing training on how to circumvent detection and defence systems.