The threat actor is using an angler phishing technique to leverage the shortage of the popular hacking tool
This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/
Read the original article:
The threat actor is using an angler phishing technique to leverage the shortage of the popular hacking tool
Read the original article: