New, successful phishing attacks are using OneNote documents to gain access to computers and passwords.
Cybersecurity researchers note that it's unusual for OneNote documents to be abused in this way and there's one simple reason why attackers are experimenting with them -- because they can more easily bypass threat detection than other attachments. And it appears to be working.
Hackers are using this new trick to deliver their phishing attacks
Cybersecurity researchers note that it's unusual for OneNote documents to be abused in this way and there's one simple reason why attackers are experimenting with them -- because they can more easily bypass threat detection than other attachments. And it appears to be working.
Hackers are using this new trick to deliver their phishing attacks