Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide
Security Affairs
APRIL 30, 2020
“They adopt multiple tactics and techniques to avoid traffic detection and automated threat intelligence gathering, such as the use of file-sharing services and web application hosting from reputable vendors. When adopting cloud based corporate services, it is crucial to enforce 2FA authentication to mitigate risks of login credential theft.
Let's personalize your content