đŠč
CYBERSECURITY BOOK
Ctrl
K
Copy
đ§ââïž
ADVANCED PERSISTENT THREATS - RESEARCH
Data exfiltration
The attacker extracts the target's data and moves it to their own system
Previous
Command and Control
Next
Impact
Was this helpful?