Gone are the days when an attack could be detected easily or would leave “obvious” clues for qualified users to follow and identify. Now, breaches are done in complete anonymity and without prejudice. Anyone can become a victim.