When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

These malicious files are engineered to extract as much information as possible, operating quickly and stealthily.

X-Labs Security Researcher at Forcepoint.

This exfiltrates data using Instant Messaging telegrams services or dynamicDNSservices.

Clicking the documents triggers a chain of downloads and obfuscated scripts to steal user credentials and cryptocurrency wallet data.

This campaign resembles the earlier Agent Tesla attacks, but uses novel obfuscation techniques.

Cybercriminals are continuously evolving their tactics, so organizations must too for stay ahead.

However, arguably one of the most important parts of an organization’s defense is its people.

Employees must be aware of their role in organizational security.

Human error can be the weakest link in the security chain, so it is important staff are educated.

Infostealers represent a growing and insidious threat in todays digital era, preying on unprotected organizations and unknowing individuals.

When all is said and done, proactive prevention and informed employees are the ultimate line of defense.

We’ve compiled a list of the best business password managers.

The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.