Concerned About Your Business Cyber Security?

(877) 321--7374

Dissecting Malicious MS Office Docs, (Mon, Sep 17th)

Looking back at the story I posted 2 weeks back, on getting target users to leak credentials using malicious UNC links in office (or other) documents ( https://isc.sans.edu/forums/diary/24062/ ) – how would you actually identify a malicious document of this type?  After a bit of digging, it turns out that there are a few ways to do this.

Ready For ASuperheroI.T. Solution?

Real Time Web Analytics