In which Alex explains the meaning of this phrase: “The threat actor used OSINT reconnaissance to map our attack surface, exploited a vulnerability to gain initial access, then used lateral movement and privilege escalation before exfiltrating PII and establishing persistence”