Question: Although phishing uses email, it takes a more targeted approach. Cybercriminals start by using open - source intelligence ( OSINT ) to gather information from
Although phishing uses email, it takes a more targeted approach. Cybercriminals start by using opensource intelligence OSINT to gather information from published or publicly available sources like social media or a company's website.
Watering hole
Spear
Clone
Email
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
