What happens if you take a pinch of social engineering, a grain of evasion, and throw some anonymization techniques into the mix? Well, a perfect recipe for phishing. Check this example to see how attackers try to lure end-users to act wrongfully.
Join our upcoming webinar! Up in the Cloud: The New Threat Landscape for Email, Browsers & Cloud Channels.