Don’t feed the phish: recognize and avoid phishing scams
Attacks begin with a PHISHING EMAIL INVOICE and a PDF ATTACHMENT to unsuspecting victims in hopes that they will be paid without the recipient noticing that they are part of a scam. This attachment sometimes contains a unique ID and phone number with the suggestion that if there’s a problem, the victim should call, or


