Research Article
Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix
Figure 3
Critical tactics and frequently used techniques by the APT groups are described. Critical tactics and frequent techniques are considered as weakest link to mitigate.