Today > | 1 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
A sophisticated ongoing attack has been discovered that evades antivirus software, prevents sandbox uploads, and bypasses Outlook's spam filters. The attackers deliberately corrupt files to conceal their type, making detection difficult for security tools. These corrupted files, often identified as…