Topic: attack timelines exploitation speed