Post of the day
PoseidonAPT

Targeted attacks are visibly commoditizing, choosing cost efficiency over sophistication. If a combination of social engineering, tweaks to widely-available malware and legit apps can do the trick, why bother to create something original and exquisite? Nevertheless there remain true adepts – those who perceive every cyberespionage operation as another stage in the quest for ultimate…