On October 10th, researchers at the Chinese firm Qihoo 360 published an article warning of a zero-day exploit (CVE-2017-11826) affecting Office and which was already actively being exploited by attackers. In the last few hours, we have detected a spam campaign targeting companies and making use of this exploit. This is a very dangerous attack since commands can be executed in Word with no OLE objects or macros needed. All our clients are proactively protected and updating will not be necessary thanks to Adaptive Defense 360. Behavior The email comes with an attached document. When opening the Word document,...Read More
Fluent Design is finally arriving to Windows 10 Earlier this year, Microsoft unveiled its Fluent Design System, a new design language for the Windows 10 interface, announcing at the same time a number of changes to the company’s software in the future. This week, the Redmond company has finally rolled out the first phase of the new system, as part of the Windows 10 Fall Creators Update. The launch has been accompanied by a video showcasing some of the new design changes to Windows 10, although it doesn’t reveal much information about any of the future additions. The video...Read More
Why can KRACK be so dangerous? Cybersecurity experts have discovered a critical weakness in Wi-Fi connections that could make your private information vulnerable to cyber criminals. The threat is called KRACK (key reinstallation attacks) and could allow someone to steal information sent over your private Wi-Fi or any open connections you might access in public places like coffee shops. KRACK is dangerous because it affects so many people. Most people who connect wirelessly to the internet through Wi-Fi on their phone, tablet, laptop, etc. do so using the WPA2 (Wi-Fi Protected Access) protocol that helps keep your information safe...Read More
Unlike the malware that we’re “used to”, fileless malware is able to infect and cause damage without leaving a trace. Its secret, as its name indicates, is not to record any type of file on the hard disk. All action takes place “in the air”, that is, on memory. The moment the system restarts the virus will disappear, but the damage will already be done. Can you fight an enemy that leaves no trace? Of course the answer is yes. What is Fileless Malware? Fileless malware is a type of Advanced Volatile Threat or AVT, malicious code that is...Read More
Last month we wrote about the biggest hack of sensitive personal data in history. Equifax, the financial entity that manages data for more than 820 million consumers and more than 91 million businesses around the world, suffered a global attack by an organized group called the PastHole Hacking Team, affecting customer data not only from the United States, but also Canada and the United Kingdom. Following the recent events, it has come to light that the massive hacking attack is not the only grievance that the company has suffered. As it turns out, there was also malware on the...Read More
A New Attack Takes Advantage of an Exploit in WordOct 20, 2017 | Security News
Promotional Notifications and Special Deals.
Join our mailing list to receive the latest news and updates from our team.