The non-ransomware extortion group has switched up tactics and victimology in a deliberate and focused campaign similar to those of other attackers focused on stealing sensitive data.
Go to Source
Author: Elizabeth Montalbano, Contributing Writer
Go to Source
Author: Elizabeth Montalbano, Contributing Writer