A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within
48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
anonymous1966
Highly Voted 2 years, 10 months agoWISDOM2080
Most Recent 10 months, 2 weeks agoSecurityGuy
1 year, 9 months agoBobbyYarush
2 years, 4 months agoBobbyYarush
2 years, 4 months agosaakovv
2 years, 5 months agohalamah
2 years, 8 months agoLeo_Visser
3 years ago