Formidable threat actors find weakest link to breach data :