jeffw@lemmy.worldM to News@lemmy.world · 18 hours agoHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comexternal-linkmessage-square1fedilinkarrow-up171arrow-down11
arrow-up170arrow-down1external-linkHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comjeffw@lemmy.worldM to News@lemmy.world · 18 hours agomessage-square1fedilink
minus-squarehalcyoncmdr@lemmy.worldlinkfedilinkEnglisharrow-up24·17 hours agoIf a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.
If a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.