Phishing attack's unusual file attachment is a double-edged sword
In a new report by Trustwave, researchers explain how a threat actor has begun to utilize WIM (Windows Imaging Format) attachments to distribute the Agent Tesla remote access trojan.
In a new report by Trustwave, researchers explain how a threat actor has begun to utilize WIM (Windows Imaging Format) attachments to distribute the Agent Tesla remote access trojan.
Tags: Attachmentattack039sDoubleEdgedFilePhishingSwordunusual
by HakTechs · Published January 20, 2021
by HakTechs · Published May 7, 2021
by HakTechs · Published August 14, 2021
Best Articles