
Phishing with Shortcuts: The Hidden Power of .LNK Files
In this blog, we explore Windows Shell Link files in detail, showcasing their use cases, creation, and structure in phishing campaigns.
In this blog, we explore Windows Shell Link files in detail, showcasing their use cases, creation, and structure in phishing campaigns.
In this blog post, our security research team dives into the details of Mark of the Web (MoTW) feature on Windows and the recent 7-Zip bypass.
In this blog post, our security research team presents a detailed analysis of an active phishing campaign that targets users via a fake CAPTCHA.