Two cyberattack campaigns are making the rounds using unique social-engineering techniques.
Source: Threadpost