Business Email Compromise (BEC)
These attacks involve spoofed or compromised email accounts used to manipulate normal business workflows and redirect funds. What makes BEC especially dangerous is that it often does not require malware. It relies on trust, timing, and persuasion.