The Anatomy of a Lazy Phish

A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.

This post appeared first on Dark Reading
Author: Jordan Shakhsheer Information Security Engineer, Bluestone Analytics