Concerned About Your Business Cyber Security?

(877) 321--7374

Microsoft Office VBA Macro Obfuscation via Metadata, (Sat, Dec 16th)

Often, malicious macros make use of the same functions to infect the victim’s computer. If a macro contains these strings, it can be flagged as malicious or, at least, considered as suspicious. Some examples of suspicious functions are:

Ready For ASuperheroI.T. Solution?

Real Time Web Analytics