breach-starts-before-data-exfiltration.md
identity-progression-attacks.md
supply-chain-attacks.md
why-were-building-vec0.md