: Once opened, scripts can run in the background to exfiltrate personal data. 🛡️ What to Do
Could you tell me or who sent it to you? This will help determine if it's a known threat or a safe document.
: Malicious files often look like documents but are actually .exe or .scr files disguised with document icons.
: Confirm with the sender through a different communication channel if they actually sent it.