Phishing seems to be cyclical and thematic.

Previous articlePrivate Internet Access 3.3 Unquoted Service Path
Next articleCyber dimensions of Russia’s hybrid war against Ukraine. Hacktivists and cybercriminals choose sides. Lapsu$ releases NVIDIA and Samsung data (and says a victim hacked back).