Technology ❯ Cybersecurity ❯ Phishing ❯ Malware
Researchers say the lure abuses browser file‑upload flows to run PowerShell via the File Explorer address bar.