'Elusive Comet' Attackers Use Zoom to Swindle Victims
from DarkReading 21 April indexed on 22 April 2025 4:01The threat actor uses sophisticated social engineering techniques to infect a victim's device, either with an infostealer or remote access Trojan (RAT).
Read more.