The threat actor used a combination of open-source and publicly available tools to establish their attack framework
First seen on infosecurity-magazine.com
Jump to article: www.infosecurity-magazine.com/news/hackers-financial-businesses-africa/
![]()
The threat actor used a combination of open-source and publicly available tools to establish their attack framework
First seen on infosecurity-magazine.com
Jump to article: www.infosecurity-magazine.com/news/hackers-financial-businesses-africa/
![]()