Malicious Usage of eM Client In Business Email Compromise

If you’ve found your way to this article, it’s likely because you have found a suspicious application content for eM Client. This is an application that is similar in it’s usage to PERFECTDATA SOFTWARE, but is also distinct. While the exact reason why threat actors use that application is not conclusively known, my examination of […]

Malicious Usage of eM Client In Business Email Compromise Read More ยป