The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
Unit 42 observes a wave of attacks leveraging popular third party services to deliver malicious decoy documents.
Unit 42 observes a wave of attacks leveraging popular third party services to deliver malicious decoy documents.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.