March 18, 2023, 3:26 a.m. | /u/cybermepls

cybersecurity www.reddit.com

Microsoft OneNote has been abused significantly to deliver malware onto unsuspecting victims as it begins to gain popularity in terms of usage by the public.

With malicious threat actors adapting to Microsoft OneNote to deliver their payload to gain initial access - it is important to have a minimal high-level understanding of how the attack works underneath the hood.

[In this video posted on Gemini Security Youtube channel](https://youtu.be/JHjSJPzJzZU), it is detailed exactly how malicious threat actors are using OneNote to …

access attack cybersecurity high important initial access malicious malware microsoft microsoft onenote onenote payload public terms threat threat actors understanding video walkthrough

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Systems Administration

@ Peraton | Washington, DC, United States

Android Security Engineer, Public Sector

@ Google | Reston, VA, USA

Lead Electronic Security Engineer, CPP - Federal Facilities - Hybrid

@ Black & Veatch | Denver, CO, US

Profissional Sênior de Compliance & Validação em TI - Montes Claros (MG)

@ Novo Nordisk | Montes Claros, Minas Gerais, BR

Principal Engineer, Product Security Engineering

@ Google | Sunnyvale, CA, USA