Linked Presentation: How does Endpoint Detection use the MITRE ATT&CK Framework?It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing DetectorsTrue Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center