Cyber Services Snapshot - The Evolution of Cyber Attacker Techniques