OneNote Malicious Attachment as Initial Vector – Detect, Investigate, and...
Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with OneNote becoming a popular option after macros were disabled. The attack is not new, with techniques...
View ArticleTTPs of Russian SVR-affiliated Threat Actor Exploiting CVE-2023-42793
Recently, CISA, along with the National Cyber Security Centre (NCSC) of the United Kingdom, the Polish Military Counterintelligence Service (SKW), CERT Polska (CERT.PL), and the Federal Bureau of...
View Article