Employees at CloudCom receive a suspicious email claiming to be from "CloudCom Support," informing employees that their passwords need to be reset
urgently due to a security breach. The email includes a link to a login page that looks identical to CloudCom's official site.
What type of social engineering attack does this scenario exemplify?
SMiShing
Watering hole attack
Typosquatting
Phishing