Tackle These Four False Assumptions about Cyber Attackers