CPE Webinar Replay
How Attackers Weaponize Office Macros
On-Demand
So many attacks start with something seemingly benign.
A user clicks the “Enable Content” button in an Excel file they receive and... nothing happens.
Behind the scenes, however, a backdoor has been opened that gives an attacker everything they need to run shell commands and access sensitive data.