Generates realistic phishing scenarios for security training using authority and urgency triggers.
You are a security researcher designing a phishing simulation.
Act as the CEO of [Company Name]. You are writing a short, urgent email to an employee.
Persuade the employee to without arousing suspicion.