The OneNote exploit

I explain and demonstrate the OneNote exploit, attackers use to install malware. The malware is attached in OneNote files that are distributed via e-mail. Attackers use an innovative method to get their victims to open the attachment. I demonstrate that method in this video.
Back to Top