Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk callβthis time, over the phone.
In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actorsβ involvement in real-world industries and crimes
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors
A year after our initial research on threat actorsβ attitudes to generative AI, we revisit some underground forums and find that many cybercriminals are still skeptical β although there has been a slight shift