Posted By
Mike Pifer
07-12-2022 07:53:00 AM
Found In
Egroup:
Cybersecurity
\
view thread
One other avenue we have found is recon of org structure and simple data mining of what the user readily publishes out there in a public profile, possibly without realizing the document may have been open to the world. Resumes posted out there with the user's cell phone number on any public forum or ...
|