Hacker's Playbook 2nd Edition Q4 2016
From the report, “How do we actually “play the hacker”? We do this by deploying simulators that play the role of a “virtual hacker” across endpoints, network and cloud, and execute breach methods from our hacker’s playbook.
(more available)
Added: