Researchers are tracking multiple clusters that are using social engineering to gain access to victims.
First seen on cybersecuritydive.com
Jump to article: www.cybersecuritydive.com/news/shinyhunters-tactics-extortion-okta-environ/811112/
![]()
Researchers are tracking multiple clusters that are using social engineering to gain access to victims.
First seen on cybersecuritydive.com
Jump to article: www.cybersecuritydive.com/news/shinyhunters-tactics-extortion-okta-environ/811112/
![]()