Malicious PDFs | Revealing the Techniques Behind the Attacks

PDF files are great for users, and crafted PDFs are great for cybercriminals! How do attackers turn a PDF into a malicious attack vector? Find out here!
The post Malicious PDFs | Revealing the Techniques Behind the Attacks appeared first on Security Bo… Continue reading Malicious PDFs | Revealing the Techniques Behind the Attacks

Separ Malware Plucks Hundreds of Companies’ Credentials in Ongoing Phish

An ongoing phishing campaign is targeting hundreds of businesses to steal their email and browser credentials using a simply – but effective – malware. Continue reading Separ Malware Plucks Hundreds of Companies’ Credentials in Ongoing Phish