jeffw@lemmy.worldM to News@lemmy.world · 1 day agoHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comexternal-linkmessage-square1fedilinkarrow-up173arrow-down12
arrow-up171arrow-down1external-linkHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comjeffw@lemmy.worldM to News@lemmy.world · 1 day agomessage-square1fedilink
minus-squarehalcyoncmdr@lemmy.worldlinkfedilinkEnglisharrow-up24·1 day agoIf a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.
If a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.