A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within
48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
anonymous1966
Highly Voted 2 years, 8 months agoWISDOM2080
Most Recent 8 months, 2 weeks agoSecurityGuy
1 year, 7 months agoBobbyYarush
2 years, 2 months agoBobbyYarush
2 years, 2 months agosaakovv
2 years, 3 months agohalamah
2 years, 6 months agoLeo_Visser
2 years, 10 months ago