131 seconds later...
Breakdown of a Windows shortcut flaw where the program executed is different from the one in the Properties dialog
A deep dive into how attackers use Telegram to hide malicious traffic, and how defenders can detect it.