
Layered Phishing for Business Email Compromise
You user gets an important business document to respond to. It is deemed safe because the email security layer has let it in, it comes from a known email contact and all they need to do is download the “important” document. They get redirected to a file sharing service which gets them to download the








