From 0 to Breach: Anatomy of a Cyberattack Breakfast