
Does anybody have want to throw a guess like what are some other things that attackers do post exploitation? Very low effort, very high return on investment in your organization. And the vast majority of organizations do not have the ability to successfully detect these types of attacks which is ridiculous. Uh,