- Impact
- 45
It's not unusual for threat actors to pick up after fellow cyber attackers shut down their operations. Many of them still want to cause as much trouble without having to start from scratch - building their own malicious creations and infrastructure. . . .
Read full post here:
https://circleid.com/posts/dns-spotlight-rockstar2fa-shuts-down-flowerstorm-starts-up
Read full post here:
https://circleid.com/posts/dns-spotlight-rockstar2fa-shuts-down-flowerstorm-starts-up









