Endpoint Breach: What Attackers Do Next to Penetrate Your Organization