Novel phishing technique uses hacker-operated devices connected to an organization’s network via lateral phishing
This week, Microsoft security teams reported the discovery of a phishing campaign characterized by the inclusion of a novel technique that consists of attaching a malicious device to the networkRead More →