A threat actor collects information from web servers of an organization and searches for employee contact information. The information collected is further used to search personal information on the Internet. To which attack phase do these activities belong according to the Cyber Kill Chain model?
A threat actor collects information from web servers of an organization and searches for employee contact information. The information collected is further used to search personal information on the Internet.…