Attacker combines phone, email lures into believable, complex attack chain

A social engineering phone call lends authenticity to the attacker’s malicious email

Leave a Reply

Your email address will not be published. Required fields are marked *