Today > | 1 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This analysis examines the types of malicious payloads that attackers embed within Microsoft OneNote files to deceive users into executing malicious code. By analyzing approximately 6,000 malicious OneNote samples, it reveals that attackers frequently employ images resembling buttons to lure victim…