Post-breach vulnerability assessment: what the attacker left behind | Vulnox Blog