Discussion about this post

User's avatar
Interisle Consulting Group's avatar

The spear-phishing initial access is relevant to our work. Does the group use any particular registrar, TLD, string composition that we might use to delve into our data sets?

2 more comments...

No posts

Ready for more?