Article: Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign - published almost 7 years ago. Content: Introduction FireEye researchers recently observed threat actors leveraging relatively new vulnerabilities in Microsoft Office to spread Zyklon HTTP malware. Zyklon has been observed in the wild since early 2016 and provides myriad sophisticated capabilities. Zyklon is a publicly available, full-featured backdoor capable of keylogging, password har... https://www.fireeye.com/blog/threat-research/2018/01/microsoft-office-vulnerabilities-used-to-distribute-zyklon-malware.html Published: 2018 01 17 17:00:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Recovering a hacked account - published almost 7 years ago. Content: https://www.ncsc.gov.uk/guidance/recovering-a-hacked-account Published: 2018 01 17 00:00:00 Received: 2023 06 22 10:40:17 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Click to Open Code Editor