The tactic is not new, but there has been a steady increase in its use as of this spring. Read More Share this: Click to share on Facebook (Opens in new window) Facebook Click to share on X (Opens in new window) X Related Post navigation Top 5 Mistakes Businesses Make When Implementing Zero Trustdarkreading Cisco Warns of Critical Flaw Affecting On-Prem Smart Software ManagerThe Hacker News