Home SecurityPhishing How to detect Mythic activity with NDR-class solutions