The awakening of LNK files: Cyber criminals rely on shortcuts in attacks
HP publishes the latest edition of its quarterly Threat Insights Report. According to this, cyber criminals who use malware families – such as QakBot, IceID, Emotet and RedLine Stealer – for their attacks are increasingly relying on shortcut files (also called LNK) to spread the malware. So far, Office macros have mainly been used as … Read more