Read Time:6 Second
The threat actor is using an angler phishing technique to leverage the shortage of the popular hacking tool
The threat actor is using an angler phishing technique to leverage the shortage of the popular hacking tool