In a cyberattack campaign dubbed “PhantomBlu,” hundreds of employees across various US-based organizations were targeted with phishing emails masquerading as messages from an accounting service. This campaign represents a significant evolution in the tactics, techniques, and procedures (TTPs) employed by cybercriminals. They are leveraging social engineering and advanced evasion techniques to deploy malicious code. The […]
The post Hackers Exploiting Microsoft Office Templates to Execute Malicious Code appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Free Webinar : Mitigating Vulnerability & 0-day Threats
Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.
:
- The problem of vulnerability fatigue today
- Difference between CVSS-specific vulnerability vs risk-based vulnerability
- Evaluating vulnerabilities based on the business impact/risk
- Automation to reduce alert fatigue and enhance security posture significantly
AcuRisQ, that helps you to quantify risk accurately:
Source: gbHackers
Source Link: https://gbhackers.com/hackers-exploiting-microsoft/