Examining BEC Tactics Through 10 Real World Examples
Proofpoint has written a blog discussing the various social engineering tactics utilized in BEC attacks, through the lens of 10 different open-source attacks. Common themes between all the examples utilized include comprehensive reconnaissance and quickly gaining trust.