Renneder@sh.itjust.worksM to BecomeMe@sh.itjust.works · 8 months agoHackers Using Microsoft OneNote Files To Orchestrate Cyber Attacksgbhackers.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11cross-posted to: cybersecurity@sh.itjust.works
arrow-up12arrow-down1external-linkHackers Using Microsoft OneNote Files To Orchestrate Cyber Attacksgbhackers.comRenneder@sh.itjust.worksM to BecomeMe@sh.itjust.works · 8 months agomessage-square0fedilinkcross-posted to: cybersecurity@sh.itjust.works