Cyber threat analysis: Countering cyber criminals breaching your defenses