Hunting OneNote Malware: A Practical Guide for Blue Teams

Hunting OneNote Malware: A Practical Guide for Blue Teams

How to use Microsoft OneNote on Windows - Malware Delivery Initial AccessПодробнее

How to use Microsoft OneNote on Windows - Malware Delivery Initial Access

Hunting for Non-Traditional Initial Access Vectors: OneNote Notebooks and Malicious Shortcuts (.lnk)Подробнее

Hunting for Non-Traditional Initial Access Vectors: OneNote Notebooks and Malicious Shortcuts (.lnk)

Hunting Malicious Office MacrosПодробнее

Hunting Malicious Office Macros

Customer Session: Investigating OneNote Malware with Hunters' Team AxonПодробнее

Customer Session: Investigating OneNote Malware with Hunters' Team Axon

OneNote Malware Trends - Tips and Tricks for Investigating OneNote Malware Used to Deliver AsyncRATПодробнее

OneNote Malware Trends - Tips and Tricks for Investigating OneNote Malware Used to Deliver AsyncRAT

What happens when a OneNote document is password-protected...?Подробнее

What happens when a OneNote document is password-protected...?

News of the Week - Microsoft OneNote Malware Scare 😨 #shortsПодробнее

News of the Week - Microsoft OneNote Malware Scare 😨 #shorts

01 Threat Hunting - Security Blue Team - Quiz 01 WalkthroughПодробнее

01 Threat Hunting - Security Blue Team - Quiz 01 Walkthrough

The OneNote exploitПодробнее

The OneNote exploit

SharePoint Recycle Bin Items ReportПодробнее

SharePoint Recycle Bin Items Report

Malicious OneNote Documents - Malware AnalysisПодробнее

Malicious OneNote Documents - Malware Analysis