A long-standing problem and innovative approaches for applying destructive tactics.
Recently, attackers have been actively using the Microsoft Office vulnerability, first discovered more than six years ago, in phishing campaigns to distribute Agent Tesla malware. Reports from Zscaler ThreatLabZ...