Quick coverage of seven different tools that can be used to generate malicious macro payloads. They can then be embedded into Office documents and used for phishing.…
All posts in Social Engineering
Tracking if a Microsoft Office document has been opened by a user that is targeted in a Social Engineering campaign.…