ethical-hacker video for which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?