thumbnail Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure | CloudSEK
thumbnail Detecting OneNote Abuse
thumbnail Following the LNK metadata trail
thumbnail Threat groups are using Windows LNK files to gain access