logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • MadPot: AWS Honeypot to Disrupt Threat Actors
  • How AWS threat intelligence deters threat actors
  • Microsoft’s Response to Open-Source Vulnerabilities – CVE-2023-4863 and CVE-2023-5217
  • Exim patches three of six zero-day bugs disclosed last week
  • NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-32828 (android, iot_yocto) 2 October 2023
  • CVE-2023-32829 (android, iot_yocto, yocto) 2 October 2023
  • CVE-2023-32826 (android) 2 October 2023
  • CVE-2023-32827 (android) 2 October 2023
  • CVE-2023-32830 (android) 2 October 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Why Excel 4.0 macro exploits are surging

Posted on 30 November 2020

From csoonline.com

Computerworld Cheat Sheet  >  Microsoft Excel 2016

Excel 4.0 macros have been around for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely heavily on this legitimate and long-standing functionality. 

Read more…

Posted in News

Post navigation

Previous post: Remove HDMusicStreamSearch (Removal Instructions) – Chrome, Firefox, IE, Edge
Next post: Italy Fines Apple $12 Million for Misleading iPhone Water Resistance Claims
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.