โŒ

Normal view

How to Get Malicious Macros Past Email Filters

Carrie Roberts // ย  ย  ย  A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of [โ€ฆ]

The post How to Get Malicious Macros Past Email Filters appeared first on Black Hills Information Security, Inc..

Warning: This Post Contains Macros

By: BHIS
11 February 2016 at 22:45

Lisa Woody // On the 23rd of December, a cyber attack left hundreds of thousands of people in the Ukrainian region of Ivano-Frankivsk without power. This was the first confirmed [โ€ฆ]

The post Warning: This Post Contains Macros appeared first on Black Hills Information Security, Inc..

โŒ