The tactic is not new, but there has been a steady increase in its use as of this spring. Read More Share this:FacebookXTwitterLike this:Like Loading... Related Post navigation Top 5 Mistakes Businesses Make When Implementing Zero Trustdarkreading Cisco Warns of Critical Flaw Affecting On-Prem Smart Software ManagerThe Hacker News