Jan. 31, 2023, 1:55 p.m. | Roza Maille

TrustedSec www.trustedsec.com

1    Analysis of OneNote Malware A lot of information has been circulating regarding the distribution of malware through OneNote, so I thought it would be fun to look at a sample. It turns out there are a lot of similarities between embedding malicious code into a OneNote document and the old macro/VBA techniques for Office...


The post New Attacks, Old Tricks: How OneNote Malware is Evolving appeared first on TrustedSec.

analysis attacks code distribution document fun incident response incident response & forensics information macro malicious malware malware analysis office office 365 security assessment old onenote techniques thought threat hunting trustedsec vba

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Junior Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate Director, Operations Compliance and Investigations Management

@ Legend Biotech | Raritan, New Jersey, United States

Analyst, Cyber Operations Engineer

@ BlackRock | SN6-Singapore - 20 Anson Road

Working Student/Intern/Thesis: Hardware based Cybersecurity Training (m/f/d)

@ AVL | Regensburg, DE