Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks Cyber Security News
Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News