Data Breaches & The Dark Web
Below is an example of a sextortion email. One of my client's received it this morning. These types of emails (or sometimes letters) are so effective because the criminal provides real information. The bad actors typically purchase personally identifiable information…