❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

How to Get Malicious Macros Past Email Filters

By: BHIS
5 June 2017 at 14:41

Carrie Roberts // Β  Β  Β  A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of […]

The post How to Get Malicious Macros Past Email Filters appeared first on Black Hills Information Security, Inc..

Warning: This Post Contains Macros

By: BHIS
11 February 2016 at 16:45

Lisa Woody // On the 23rd of December, a cyber attack left hundreds of thousands of people in the Ukrainian region of Ivano-Frankivsk without power. This was the first confirmed […]

The post Warning: This Post Contains Macros appeared first on Black Hills Information Security, Inc..

Using Simple Burp Macros to Automate Testing

By: BHIS
23 December 2015 at 16:53

David Fletcher // Recently, while assessing a web application I noticed content on one of the pages that appeared to be derived from sensitive information stored within the site’s user […]

The post Using Simple Burp Macros to Automate Testing appeared first on Black Hills Information Security, Inc..

❌
❌