Luckily This Was a Test!
Malicious Document or Link
What are they?
Malicious attachments, links and documents may have embedded macros or code hidden within them. Attackers use these to gain initial access to an organization by spreading hidden malware embedded within the document. This was a simulation using cloned audio, we’ll send you a text shortly so you can learn what these are.
Don’t worry, these are emerging threats and we’ll help educate you for the next time.
Text back “confirm” and we’ll send you a link to explain what voice cloning is.