Cyberespionage group TA402, known for targeting government entities in the Middle East and North Africa, has altered its infection chain tactics three times recently, despite no observed change in its targeting. Its recent campaigns use spear-phishing emails sent from compromised email accounts of legitimate entities, delivering custom malware implant, IronWind. The group’s activities overlap with those attributed to Molerats, Gaza Cybergang, Frankenstein, and WIRTE, suggesting these could all be aliases.

Nearly 250,000 Records From Tax Credit Consulting Agency Exposed
Summarize this content to a maximum of 60 words: Research has uncovered an unencrypted, non-password-protected database containing 245,949 records.