Applying Hacker Reasoning in Cybersecurity