It’s not unusual for a threat actor to exaggerate the extent of a hack or breach to drum up interest, and hopefully, the eventual purchase or ransom p…
First seen on blog.talosintelligence.com
Jump to article: blog.talosintelligence.com/threat-source-newsletter-aug-22-2024/