The threat actor used a combination of open-source and publicly available tools to establish their attack framework
This article has been indexed from www.infosecurity-magazine.com
The threat actor used a combination of open-source and publicly available tools to establish their attack framework