During this phase of the attack, the first compromise happens, such as the dropping of a spear-phishing email or bypassing of network firewalls.
During this phase of the attack, the first compromise happens, such as the dropping of a spear-phishing email or bypassing of network firewalls.