How modern data breaches attack every layer of the application stack