Collection
Collection techniques are used by attackers to collect information through the cluster. This is typically exfiltration of data.
Collection techniques are used by attackers to collect information through the cluster. This is typically exfiltration of data.