githubEdit

sign-posts-wrenchInitial Compromise

The attacker gains access to the target's network, often through a spear-phishing attack