An attacker could pose as a company employee, invite customers or partners to meetings, then use socially engineered conversation to extract sensitive information.
Source link
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Related
Author: Jessica Venkat
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea