so maybe you will enjoy this one ... slightly different approach ... but there have been a number of recent articles about many attacks are becoming quite a bit more focused
Security Reference Guide > How to Steal 80,000 Identities in One Day
http://www.informit.com/guides/content.asp?g=security&seqNum=243&rl=1
does overlap with
How to breach a company: Spies, Lies and KPMG
https://financialcryptography.com/mt/archives/000868.html
MT::App::Comments=HASH(0x55b592f61d10) Subroutine MT::Blog::SUPER::site_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.