News

While the ultimate goal of this phishing attack is nothing new, its use of corrupted Word documents is a novel tactic used to evade detection. "Although these files operate successfully within the ...
A new report from cybersecurity researchers Any.Run observed crooks distributing corrupted Microsoft Word files in their campaigns. Most phishing emails come with an attachment.
How the delete-upon-save bug works According to Microsoft, this bug currently affects Microsoft 365 version 2409 and occurs with files that have a file extension that’s saved in all capital letters.
When opened, the files prompt Microsoft Word’s recovery mode, which reconstructs the document and displays instructions to scan a QR code. Scanning the code redirects users to a fake Microsoft login ...