Common initial attack vectors
How attackers are most apt to get into target companies’ infrastructure.