Malicious Documents – PDF Analysis in 5 steps
Mass mailing or targeted campaigns that use common files to host or exploit code have been and are a very popular vector of attack. In other words, a malicious PDF or MS Office document received via e-mail or opened trough a browser plug-in. In regards to malicious PDF files the security industry saw a significant increase … Continue reading Malicious Documents – PDF Analysis in 5 steps
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed