Introducing the next chapter of the NCSC research problem book, which aims to inspire research on the biggest impact topics in hardware cyber security.
The fourth and final part of a series investigating how automation is used to create fake accounts for fraud, disinformation, scams, and account takeover.