During a regular security scan of the network you find that several user laptops are infected with the same malware. After cross-referencing the laptop users with the reverse proxy logs you find that they all accessed a industry news website the day before. You believe your organization may have been specifically targeted for this malware. What type of attack would best describe this theory?
|Threats, Attacks and Vulnerabilities|
|Technologies and Tools|
|Architecture and Design|
|Identity and Access Management|
|Cryptography and PKI|