11. Defense Evasion

Evasive techniques threat actors can use to escape / obfuscate activity from detection