Supply chains in businesses are usually very complex and have multiple vendors, suppliers, and service providers involved. With so many stakeholders involved, it is natural that most communication occurs over email. And attackers take advantage of it. They exploit these communication channels by either impersonating the vendor or hacking into their account to deceive their...