all InfoSec news
Default Microsoft macro blocking circumvented by threat actors
July 31, 2022, 5:01 p.m. | SC Staff
SC Magazine feed for Strategy www.scmagazine.com
Threatpost reports that while malicious macro-enabled attachment use dropped by nearly 66% from October 2021 to June 2022 as a result of Microsoft blocking Office macros by default, threat actors have been leveraging new tactics to get around Microsoft's defense strategy in new phishing attacks.
blocking email security macro microsoft social engineering threat threat actors threat intelligence vulnerability management
More from www.scmagazine.com / SC Magazine feed for Strategy
6.2K Palo Alto firewalls still at risk as exploits increase
1 day, 14 hours ago |
www.scmagazine.com
New Five Eyes AI security guidelines unveiled
4 days, 20 hours ago |
www.scmagazine.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Operations Analyst
@ Astranis | San Francisco
Manager - Business continuity Security and Safety.Risk and Compliance
@ MTN | Benin
Cyber Analyst, Digital Forensics Incident Response
@ At-Bay | Canada
Technical Product Manager, AppSec and DevSecOps
@ Penn Interactive | Philadelphia
Experienced Cloud Security Engineer (m/f/d) - Cybersecurity
@ MediaMarktSaturn | Barcelona, ES, 8003