logo
  • About
  • Contact
  • Hall of fame

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Google Confirms 75 Zero-Day Attacks: Phones And Browsers Were Targeted
  • Mitre warns over lapse in CVE coverage
  • Over 200 Million Records Allegedly Belonging to X Leaked Online
  • Catastrophic hack of AT&T and Verizon is proof Apple is right about iPhone encryption
  • Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

doctrack: manipulate and insert tracking pixels into Office Open XML documents

Posted on 7 November 2020

From securityonline.info

Doctrack

Features

  • Insert tracking pixels into Office Open XML documents (Word and Excel)
  • Inject template URL for a remote template injection attack
  • Inspect external target URLs and metadata
  • Create Office Open XML documents (#TODO)

Read more…

Posted in News

Post navigation

Previous post: FBI: Hackers stole source code from US government agencies and private companies
Next post: Hotel reservation platform leaked user data from top online booking sites
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.