Investigating suspicious Office files
A major step in incident handling is to confirm whether a security incident is in fact taking place. Excessive handling of false positives can also cost an organization dearly in the long run. Recently, attacks using Office (or other office applications such as Ichitaro) as a vector have become more popular, making this identification stage a bit more difficult.
Read the article HERE.
Read the article HERE.
0 Comments:
Post a Comment
<< Home