đŠč
CYBERSECURITY BOOK
Ctrl
K
Copy
đ§ââïž
ADVANCED PERSISTENT THREATS - RESEARCH
Collection
The adversary is trying to gather data of interest to their goal.
Previous
Lateral movement
Next
Command and Control
Was this helpful?