A multi-OS attack can turn one threat into several different investigations at once. The campaign may follow a different path ...