The tactic is not new, but there has been a steady increase in its use as of this spring. Read More Share this: Share on Facebook (Opens in new window) Facebook Share on X (Opens in new window) X Related Post navigation Top 5 Mistakes Businesses Make When Implementing Zero Trustdarkreading Cisco Warns of Critical Flaw Affecting On-Prem Smart Software ManagerThe Hacker News