Previewing the file is enough to have the threat actor run code remotely. …read more
Source:: techradar.com – Gadgets