jeffw@lemmy.worldM to News@lemmy.world · 2 days agoHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comexternal-linkmessage-square1fedilinkarrow-up174arrow-down12
arrow-up172arrow-down1external-linkHow ‘Spear Phish’ Hackers Used Fake Ginni Thomas to Hit Trump Campaignwww.thedailybeast.comjeffw@lemmy.worldM to News@lemmy.world · 2 days agomessage-square1fedilink
minus-squarehalcyoncmdr@lemmy.worldlinkfedilinkEnglisharrow-up24·2 days agoIf a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.
If a Spear Phish works that well with individuals outside the official group in question, it should be able to be entered into evidence as proof of expected collaboration/collusion between the parties.