Operation Brightroar: Uncovering more attack pattern
After publishing our previous blog we got lots of similar attack sample from various sources. We found the attacker to be using various social engineering techniques. »
After publishing our previous blog we got lots of similar attack sample from various sources. We found the attacker to be using various social engineering techniques. »
A couple of days ago, we noticed that a few somewhat suspicious text messages, claiming to give the user "free internet" and other things, was being »