I’ll start this story with an example of a phishing attack run by one of the Russian sponsored hacking groups currently involved in the Russian Ukraine conflict. You are not likely to be one of their carefully selected targets but it illustrates how other threat actors operate. The group is …
Continue reading “Phishing this is how the malware gets in!”