CTI Roundup: Gophish Toolkit Phishing, Malicious Virtual Hard Drive Files, Return of Bumblebee Malware
Threat actor uses the Gophish toolkit in phishing campaigns, attackers bypass secure email gateways and antivirus scanners, and Bumblebee malware returns.