The adversary is actively collecting and exploiting information through various means to identify and target vulnerabilities in systems and infrastructure. You can take a look at our content about the adversary is collecting information regarding that we have compiled from all of sources.