Jan. 21, 2023, 4:15 p.m. | Lawrence Abrams

BleepingComputer www.bleepingcomputer.com

Threat actors now use OneNote attachments in phishing emails that infect victims with remote access malware which can be used to install further malware, steal passwords, or even cryptocurrency wallets. [...]

access attachments cryptocurrency cryptocurrency wallets emails hackers infect install malware microsoft microsoft onenote onenote passwords phishing phishing emails remote access security steal threat threat actors wallets

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium