WSTR Part 2

WSTR Part 2

We hope you enjoyed part 1 of the Symantec WSTR 2015. Now download part 2 for the latest on the fast-evolving world of targeted attacks – from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *

three × 5 =