Methodologies employed by attackers, shared within ISO.