A threat actor uses an unusual attachment to bypass security software that is a double-edged sword that may work against them. As secure email gateways and security software become more advanced and ...