I really like this post from thehackernews found HERE. This posts breaks down how threat actors are by passing security defenses as well as the plumbing behind some common attacks. Topics cover Phishing attacks, Anti-Researcher techniques, evading Anti-virus, evading device verification, evading anomaly detection, etc.
Check it out HERE.