
Sign up to save your podcasts
Or


Impersonation of cybersecurity firms by threat actors as part of callback phishing attacks.
Luna Moth becomes the latest attack group to perform Ransomware style extortion without encryption.
Searchable data leak sites gain traction among threat actors as new leverage tool.
By Talion Threat Intelligence TeamImpersonation of cybersecurity firms by threat actors as part of callback phishing attacks.
Luna Moth becomes the latest attack group to perform Ransomware style extortion without encryption.
Searchable data leak sites gain traction among threat actors as new leverage tool.