People who are responsible for attacking your systems - directly or by using malware, phishing scams or social attacks. Their methods are increasingly sophisticated. They could be after card details, stored in text or in call recordings where numbers were read out.