Cybercriminals are spamming website contact forms and discussion forums to distribute Excel XLL files that download and install the RedLine password and information-stealing malware. RedLine is an ...
The use of .XLL Excel files by threat actors to infect computers with malware is growing fast. Learn more about this relatively new technique and how to protect from it. Image: Sashkin/Adobe Stock ...
Websites with contact forms and comment sections, as well as discussion forums, are being used to distribute a known password-stealing malware through a compromised Microsoft Excel file. According to ...
Microsoft plans to add a feature to Office Excel that will make it harder for cyberattackers to exploit the spreadsheet application's "add-ins" function to run malicious code on a victim's computer.
Microsoft may have blocked macros from running by default in its Office suite of programs, but there are workarounds, researchers are saying. Several months after the ban was introduced, one specific ...
Research suggests Emotet is testing new tactics, techniques, and procedures on a small scale before adopting them in wider activity. Notorious threat group Emotet has been detected testing new and ...
Dubai, United Arab Emirates – HP Inc. (NYSE: HPQ) today released its latest global HP Wolf Security Threat Insights Report, providing analysis of real-world cybersecurity attacks. By isolating threats ...
In a significant cybersecurity achievement, Nigerian cybersecurity researcher Christian Bassey has identified the methods employed by the Russian cybercrime group FIN7 to distribute the JSSLoader ...
The bad actors behind a dangerous malware campaign may not have been put completely out of action by law enforcement, the Talos research group at Cisco warned today. While the Qakbot banking Trojan ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results