Tous les liens d'un jour sur une page.
Over 130 organizations have been compromised in a sophisticated attack using simple phishing kits
Threat actors evade detection by adopting the Sliver command-and-control (C2) framework in intrusion campaigns.