This is a dedicated watch page for a single video.
To carry out a successful attack, hackers carefully craft phishing messages by gathering extensive information about the target company. This includes collecting emails of real employees, understanding the company’s hierarchy, and studying the formatting and branding (logos, styles, etc.) of official communications. What is this phase of the hacker’s process called?