jeffw@lemmy.worldM to News@lemmy.world · 2 months agoHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comexternal-linkmessage-square1fedilinkarrow-up175arrow-down12
arrow-up173arrow-down1external-linkHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comjeffw@lemmy.worldM to News@lemmy.world · 2 months agomessage-square1fedilink
minus-squarehalcyoncmdr@lemmy.worldlinkfedilinkEnglisharrow-up23·2 months agoIf a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.
If a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.