Bypassing Endpoint Controls Using Office Macros (ft. Kilian from Varonis)
So many attacks start with a simple booby trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint …
by SecurityFWD
windows server dns forwarder