Technology ❯Cybersecurity ❯Phishing ❯Malware
Researchers say the lure abuses browser file‑upload flows to run PowerShell via the File Explorer address bar.