all InfoSec news
Follina 0day exploit. Malicious code execution in Office docs
June 1, 2022, 5:38 a.m. | Luke Davis
Pen Test Partners www.pentestpartners.com
Disclaimer: I know this isn’t a unique post on the subject, and that many other outlets are covering it, but this zero-day is so serious that it needs as much […]
The post Follina 0day exploit. Malicious code execution in Office docs first appeared on Pen Test Partners.
0day code code execution dfir docs exploit follina malicious office
More from www.pentestpartners.com / Pen Test Partners
Living off the land with native SSH and split tunnelling
1 month, 1 week ago |
www.pentestpartners.com
Advice for manufacturers on the coming PSTI regulation
1 month, 3 weeks ago |
www.pentestpartners.com
No fix KrbRelay VMware style
1 month, 4 weeks ago |
www.pentestpartners.com
Cyber security for Credit Unions 101
1 month, 4 weeks ago |
www.pentestpartners.com
QR Phishing. Fact or Fiction?
2 months ago |
www.pentestpartners.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Information Systems Security Officer (ISSO), Junior
@ Dark Wolf Solutions | Remote / Dark Wolf Locations
Cloud Security Engineer
@ ManTech | REMT - Remote Worker Location
SAP Security & GRC Consultant
@ NTT DATA | HYDERABAD, TG, IN
Security Engineer 2 - Adversary Simulation Operations
@ Datadog | New York City, USA