Estimated reading time: 3 minutes
Amidst the incessant hustle and bustle of holidays, while most organizations and consumers are busy enjoying the merrier times, cyber risks are subtly growing and getting ready to chew up on consumer experiences and company profits. Last few years...Estimated reading time: 3 minutes
For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several...Estimated reading time: 3 minutes
Single security measures haven’t been successful in controlling and mitigating the lingering cybersecurity threats. This is why a majority of enterprises are slowly shifting towards multi-layered security strategies for strengthening their IT security framework. Unified Threat Management or UTM...