When an attacker follows up a seemingly legitimate email with another email that has malicious code embedded in it.
← Baiting Attack Brand Impersonation →
Browser Hijacking
Password Spraying
Phishing Payload
Phishing Tracking
Phishing Hosting
Phishing Template
Phishing Kit
DeFi Protocol