An employee receives an email that appears to come from thei…
An employee receives an email that appears to come from their company’s IT department, asking them to log in to a portal to “verify unusual activity.” The login page looks identical to the real system. After entering credentials, nothing happens. What type of attack most precisely occurred?
Read Details