Cyber threat actors are constantly developing new Tools, Techniques and Procedure (TTP) to break your first line of defense offered by firewalls, intrusion prevention system, email and web security gateways to gain a foothold in your organization. Once they get in, they craft their moves to cover their tracks and…