Modern attackers come from any and every angle, but one thing they all want is access to data. But this doesn’t mean they just want to land in some database… more often than not, advanced attackers are looking for ways to monitor information flows to gain credentials and learn more about the systems and organizations they infiltrate.