New attack possibilities that help you gain and maintain persistence
How to conduct more advanced social engineering attacks to move laterally
Link-spoofing techniques that can make phishing links much harder to spot
How malicious Slack messages can be modified later to replace the phishing link, covering your tracks