Home » The anatomy of a cyberattack