Forwarding you to rethinksecurity.io

Deconstructing a Sexploitation Attack | ReThink Security

Imagine receiving an email with your username and password as the subject line. Inside the email there is a PDF that has been encrypted with a password provided in the body of the email. What do you do? Whoever sent the email has already proven they know who you are, and you probably want to know what else they have and what theyre asking for, right?