What is a phishing attack in the context of cybersecurity?
B. Searching for hidden treasures in cyberspace
A. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
D. Building a fake website for online shopping
C. Sending anonymous emails to everyone in the company