Aug. 10, 2023, 3:27 a.m. | /u/SSJCalzana

Computer Forensics www.reddit.com

Hey everyone,

First time poster, long time lurker.

Our organization is looking at expanding operations and providing business mailbox IR for small businesses.

We have been given our first IR job around a malicious actor gaining access to a clients mailbox, forging a fake invoice, and then sending that invoice to another user. There is a potential they accessed PII information while they had access to mailbox, hence why we have been asked to provide assistance.

My question; what would …

access actor business businesses clients computerforensics fake fake invoice forensic hey job malicious operations organization small businesses tool

Information Security Cyber Risk Analyst

@ Intel | USA - AZ - Chandler

Senior Cloud Security Engineer (Fullstack)

@ Grab | Petaling Jaya, Malaysia

Principal Product Security Engineer

@ Oracle | United States

Cybersecurity Strategy Director

@ Proofpoint | Sunnyvale, CA

Information Security Consultant/Auditor

@ Devoteam | Lisboa, Portugal

IT Security Engineer til Netcompany IT Services

@ Netcompany | Copenhagen, Denmark