computersecurity

  1. Neemobeer

    Tutorial: Analyzing Malicious PDFs

    Hi all, in this post we will be exploring malicious PDF files and how the bad guys leverage them to infect computer systems. I'm sure a lot of people are familiar with receiving a strange email often times seemingly from a known person containing an attachment. You open it and miraculously...
  2. News

    Recent Cyberattacks

    As reported by Facebook and Link Removed, Microsoft can confirm that we also recently experienced a similar security intrusion. Consistent with our security response practices, we chose not to make a statement during the initial information gathering process. During our investigation, we found...
Back
Top