An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?
AhmedAbdalla
9 months, 4 weeks agoEng_ahmedyoussef
1 year, 10 months agoweganos
1 year, 11 months agojoseph267
2 years agoanonymous1966
2 years, 11 months ago