Today > | 3 Medium | 2 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This analysis explores a rising trend in cyber attacks where threat actors leverage LNK files and SSH commands as initial infection vectors. The attackers use meticulously crafted shortcut files, often disguised as legitimate documents, to execute commands using Living-off-the-Land Binaries (LOLBin…