jeffw@lemmy.worldM to News@lemmy.world · 3 months agoHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comexternal-linkmessage-square1fedilinkarrow-up176arrow-down12
arrow-up174arrow-down1external-linkHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comjeffw@lemmy.worldM to News@lemmy.world · 3 months agomessage-square1fedilink
minus-squarehalcyoncmdr@lemmy.worldlinkfedilinkEnglisharrow-up24·3 months agoIf a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.
If a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.