August 22, 2022
Via: Help Net SecurityResecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 worldwide, identified a new RAT (Remote Administration Tool) advertised in Dark Web and Telegram called Escanor. The threat actors offer Android-based and PC-based versions of RAT, along with HVNC module and […]
November 15, 2018
Via: CSO OnlinePrivacy Company released the results of a data protection impact assessment showing privacy risks in the enterprise version of Microsoft Office. Regarding the “large scale and covert collection of personal data” of Microsoft Office ProPlus (Office 2016 MSI and Office […]
Malware, Virus & Malware, Vulnerabilities
January 18, 2018
Via: Security WeekA piece of malware known as Zyklon has been delivered by cybercriminals using some relatively new vulnerabilities in Microsoft Office, FireEye reported on Wednesday. Zyklon has been around since early 2016 and it allows attackers to conduct a wide range […]
January 12, 2018
Via: Security WeekTwo Democratic senators, Elizabeth Warren, D-Mass., and Mark Warner, D-Va, introduced a bill Wednesday that would provide the Federal Trade Commission (FTC) with punitive powers over the credit reporting industry — primarily Equifax, Credit Union and Experian — for poor […]
Hacker, Threats & Malware, Vulnerabilities
December 19, 2017
Via: Naked SecurityRemember the DDEAUTO vulnerability? DDEAUTO, short for automatic dynamic data exchange, is a command you can put right inside the data of an Office file to get it to pull data out of another file. According to Microsoft’s official documentation, […]
December 5, 2017
Via: The HillA State Department official defended the decision to close an office dedicated to cyber diplomacy, saying it reflects an effort to integrate cyber and digital economy policymaking efforts. Secretary of State Rex Tillerson notified Congress in August of the department’s […]
October 13, 2017
Via: Threat PostRecent document-based attacks have leveraged malicious macros that if enabled install malware. But, researchers at SensePost have developed a proof-of-concept attack that does not require macros and instead uses an old Microsoft Office feature called Dynamic Data Exchange to execute […]
October 14, 2015
Via: vulnerabilitiesThe six security bulletins released by #microsoft for #october 2015 address more than 30 #vulnerabilities affecting Windows, Internet Explorer, #edge, and #office. One of the bulletins rated critical is MS15-106, which resolves a total of 14 vulnerabilities in Internet Explorer. […]
July 16, 2015
Via: vulnerabilitiesAn audit due out Friday found 3,000 “critical” and “high-risk” vulnerabilities in three key bureaus at the Interior Department, the agency hosting the hacked personnel files of 4.2 million federal employees. The weak spots, discovered through testing by the Interior […]
March 21, 2024
March 7, 2024