Introduction
This is special bonus content in our six-part series on phishing attacks and defences. Part 1 provided an overview of the series, Part 2 explored various phishing attack types, and Part 3 examined the advanced phishing framework Evilginx.
Successfully obtaining credentials through phishing is rarely the ultimate goal for