๐ฆน
CYBERSECURITY NOTES
Ask or search...
Ctrl +โK
๐งโโ๏ธ
ADVANCED PERSISTENT THREATS - RESEARCH
Initial Compromise
The attacker gains access to the target's network, often through a spear-phishing attack
Previous
Resource Development
Next
Execution