By Danny Palmer
Nearly all successful email-based cyber attacks require the target to open files, click on links, or carry out some other action. While a tiny fraction of attacks rely on exploit kits and known software vulnerabilities to compromise systems, the vast majority of campaigns, 99%, require some level of human input




