Security News

Accused bloke cuffed after plod swoop on home A 20-year-old man from the Netherlands accused of building and selling Office macro malware was arrested Wednesday.…

Evil Clippy is a tool for creating malicious Microsoft Office macros: At BlackHat Asia we released Evil Clippy, a tool which assists red teamers and security testers in creating malicious MS...

A team of security researchers has exploited Microsoft’s patchy macro documentation to hide malicious code inside innocent-looking macros.

Achieving remote code execution on systems running LibreOffice or Apache OpenOffice might be as easy as tricking users into opening a malicious ODT (OpenDocument) file and moving their mouse over...

Security researchers have discovered two separate malware campaigns, one of which is distributing the Ursnif data-stealing trojan and the GandCrab ransomware in the wild, whereas the second one is...

The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.

Macro 4 has launched a new version of the Tubes for z/OS session management software that enables enterprises to roll out IBM’s multi-factor authentication system for z/OS as they bid to make...

The ability of these simple files to open Excel and download any data from the internet makes them extremely dangerous.

'Rubella Macro Builder' Available on Cybercrime Underground for $40 Per MonthAre you a fraudster craving an easy way to generate Microsoft Office documents with embedded malicious macros designed...

A new wave of document attacks targeting inboxes do not require enabling macros in order for adversaries to trigger an infection chain that ultimately delivers FormBook malware.