The computer hacker breached the company's security systems.
The white hat hacker helped the company identify vulnerabilities in their systems.
The black hat hacker stole sensitive information from the government database.
The ethical hacker was hired to test the company's network defenses.
The hacktivist group launched a cyber attack in protest of government policies.