Sam, a professional hacker, targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS IAM credentials and further compromise the employee's account.
What is the technique used by Sam to compromise the AWS IAM credentials?
Genesis777
6 months, 1 week agoDaniel8660
7 months, 3 weeks ago4everdzc9
1 year agodinonino
8 months, 3 weeks agoANDRESCB1988
1 year, 10 months ago