-
The n8n n8mare: How threat actors are misusing AI workflow automation
Abusing n8n Webhooks to deliver malware via emails
-
Too salty to handle: Exposing cases of CSS abuse for hidden text salting
CSS Abuse for Hidden Text Salting
-
PDFs: Portable documents, or perfect deliveries for phish?
Brand impersonation via PDF payloads
-
Abusing with style: Leveraging cascading style sheets for evasion and tracking
CSS abuse in emails
Newer