Research Article

Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix

Figure 3

Critical tactics and frequently used techniques by the APT groups are described. Critical tactics and frequent techniques are considered as weakest link to mitigate.