This is a dedicated watch page for a single video.
A cybersecurity team at XYZ Corporation is investigating a data breach affecting multiple employees. They discover that attackers compromised a popular industry-specific forum frequently visited by XYZ Corporation's employees. Malware was injected into the forum’s pages, and when employees visited the site, their browsers were exploited to install keyloggers. Which type of attack was used?