March 8, 2023, midnight |

SpiderLabs Blog from Trustwave www.trustwave.com

Threat actors are taking advantage of Microsoft OneNote's ability to embed files and use social engineering techniques, such as phishing emails and lures inside the OneNote document, to get unsuspecting users to download and open malicious files.

abusing cybercriminals document download emails engineering files malicious microsoft microsoft onenote onenote phishing phishing emails social social engineering techniques threat threat actors

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Check Team Members / Cyber Consultants / Pen Testers

@ Resillion | Birmingham, United Kingdom

Security Officer Field Training Officer- Full Time (Harrah's LV)

@ Caesars Entertainment | Las Vegas, NV, United States

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States

AWS Security Engineer

@ IntelliPro Group Inc. | Palo Alto, CA

Information Security Analyst

@ Freudenberg Group | Alajuela