Today > 1 Critical | 5 High | 20 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
An intelligence report outlines a campaign where an unidentified threat actor impersonated a Microsoft recovery manual through a malicious Word document containing macros. Upon execution, the macros downloaded a novel stealer now tracked as Daolpu. This stealer targets credentials stored in web bro…