Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability
We will highlight the key points and then focus on the initial use of the CVE-2023-23397 vulnerability by attackers before it became public.
More results...
We will highlight the key points and then focus on the initial use of the CVE-2023-23397 vulnerability by attackers before it became public.
Storm-0978, a threat actor, actively targeted European and North American defense and government entities in a phishing campaign. Exploiting CVE-2023-36884, the campaign used Word documents with Ukrainian World Congress lures to abuse a remote code exe…
Microsoft Office 2016 was initially released in 2015 for both Windows and Mac. The mainstream support for Office 2016 ended in 2016, and the extended support for various editions should end by 2015. If you are facing a problem with Microsoft Office 20…
PC malware statistics for the Q1 2023 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices.
There has been a proof-of-concept published recently for CVE-2023-21716 that analyzes this vulnerability. This vulnerability has been marked as “Critical” and has been detected in Microsoft Word which permits remote code execution (RCE). Mi…
Microsoft office documents are used worldwide by both corporates and home-users alike. It’s different office versions, whether…
The post Your Office Document is at Risk – XLL, A New Attack Vector appeared first on Quick Heal Blog | Late…
Microsoft is sending the world a whole bunch of love today, in the form of patches to plug dozens of security holes in its Windows operating systems and other software. This year’s special Valentine’s Day Patch Tuesday includes fixes for a whopping three different “zero-day” vulnerabilities that are already being used in active attacks.