KidM to CybersecurityEnglish · 1 month agoNovel phising campaign uses corrupted Word documents to evade securitywww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up130arrow-down10
arrow-up130arrow-down1external-linkNovel phising campaign uses corrupted Word documents to evade securitywww.bleepingcomputer.comKidM to CybersecurityEnglish · 1 month agomessage-square2fedilink
minus-squarejaybone@lemmy.worldlinkfedilinkEnglisharrow-up4arrow-down1·1 month agoThey’ve been doing this since the 90s, so…
They’ve been doing this since the 90s, so…