How Cyberattackers Are Cultivating New Strategies and Reconfiguring Classic Gambits