There are multiple phases in an active cyberattack and each is a perilous link in a complex kill-chain that gives criminals the opportunity to spy, spread and steal critical information in native and hybrid cloud workloads and user and IoT devices.
Article Link: https://blog.vectra.ai/blog/threat-behaviors-in-the-attack-lifecycle