An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?
A. phishing email
B. sender
C. HR
D. receiver
An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?
A. phishing email
B. sender
C. HR
D. receiver