Getting Inside the Mind of an Attacker: After the Breach – Final Words of Advice | Core Security Blog