Estimated reading time: 2 minutes
What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected...Estimated reading time: 3 minutes
With increased mobility of the workforce, the Internet of Things increasing presence across industries and companies adopting BYOD policies, endpoint security is becoming the most challenging task for security teams within organizations. Further the ever-growing threat landscape tends to...Estimated reading time: 3 minutes
For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several...