APT Alert Command and Control (C2) Credential Access Critical Cyber DLP Defense Evasion Discovery Enclave Exfiltration Execution Exploit Impact Initial Access Inline Kill Chain Lateral Movement Malware Next Gen Persistence Privilege Escalation Recon Risk Sandbox SIEM SOC Swimlane Tactics, Techniques, and Procedures (TTP) Weaponize