Personal information. Examples include username, password, email address, qualifications and many more.
A malicious attack where a bad actor will attempt to obtain the credentials of a user in order to gain unau...