This is a dedicated watch page for a single video.
Which of the following cyber attack techniques specifically targets high-profile individuals or executives within an organization, typically with the aim of stealing sensitive information or gaining unauthorized access to critical systems?