Attack Catalog

Adversary techniques for credential theft and data compromise