Dec. 7, 2022, 11:28 p.m. | Matt Kapko

Cybersecurity Dive - Latest News www.cybersecuritydive.com

North Korea-linked threat actors are using a technique that has been widely used to exploit Internet Explorer via Office files since 2017, Google researchers found.

attack attack vector explorer internet internet explorer zero-day zero-day attack

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA