Countering Espionage and Foreign Interference

Cyber compromises

Threat actors use spear-phishing and social engineering, in the form of highly personalised messages aimed at tricking specific individuals into revealing sensitive information or clicking malicious links, to compromise accounts and devices. The proliferation of commercial spyware has enabled a wider range of actors to compromise devices.

»NPSA Gov →

// Published: , with 51 words. 0 mentions.

No webmentions were found.