The attack began with a successful phishing email. Post navigation Cybersecurity Responsibility in a Post-Pandemic World Researcher Reports Vulnerability in Apple iCloud Domain