Technology ❯ Cybersecurity ❯ Phishing ❯ Social Engineering
Researchers say the lure abuses browser file‑upload flows to run PowerShell via the File Explorer address bar.