The threat actors behind IcedID malware phishing campaigns are utilizing a wide variety of distribution methods, likely to determine what works best against different targets. Researchers at Team ...
A hot potato: Threat actors are including OneNote attachments in their phishing emails to infect victims with remote access malware that can be used to steal passwords or even access cryptocurrency ...