The spyware also opens an HTTP backdoor, scans and analyzes all files on both the local and network volumes and analyzes packets and data entering and leaving the infected Mac from different ...
If leveraged by an attacker, these flaws in Word, Excel, PowerPoint, OneNote, Outlook and even Microsoft Teams could be used ...