Some cyber attacks begin with a dangerous email landing in your inbox, others might take a more direct, brute force approach, or exploit multiple zero-day vulnerabilities in Windows. Sometimes, however, they begin with you and your actions, such as the password reuse attack, or, as in the case of …