Attackers are no longer probing the edges. They are embedding themselves for months or even years deep inside the systems ...