Technology ❯Cybersecurity ❯Phishing ❯Social Engineering
Researchers say the lure abuses browser file‑upload flows to run PowerShell via the File Explorer address bar.