Dec. 27, 2023, 2:57 p.m. | Tushar Subhra Dutta

GBHackers On Security gbhackers.com

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these documents, attackers trick users into opening them and leading to the execution of malicious code.  While leveraging the familiarity and trust associated with such file format, this tactic is effective for several illicit purposes:- Recently, […]


The post New Nim-Based Malware Delivered via Weaponized Word Document appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform …

attackers code computer security document documents engineering exploiting file hackers malicious malicious payloads malware nim social social engineering tactic trust vulnerabilities vulnerability word word document

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)