Phishing attacks use undocumented MS Office feature to leak system profile data
An undocumented Microsoft Office feature allows attackers to gather sensitive configuration details on targeted systems simply by sending a phishing email and social engineering victims ...
Continue Reading