Remove Computer and Electronics Remove Document Remove File names Remove Security
article thumbnail

Using Microsoft Powerpoint as Malware Dropper

Security Affairs

Marco Ramilli, founder and CEO at cyber security firm Yoroi has explained how to use Microsoft Powerpoint as Malware Dropper. Nowadays Microsoft office documents are often used to propagate Malware acting like dynamic droppers. I am a computer security scientist with an intensive hacking background.

article thumbnail

France: the CNIL has released its annual dawn raid Program for 2023: four national priorities and one priority coming from the EDPB!

DLA Piper Privacy Matters

As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). This document provides guidance on the conditions applicable to the use of this technology which presents high risks to the data subjects’ right to privacy.

article thumbnail

Cyber Threats Observatory Gets Improvements

Security Affairs

In other words, it could be nice to see what are the patterns used by malware in both: domain names, file names and process names. TOP domains, TOP processes and TOP File Names. It looks like to be the most active observed period for this well documented family during the 2020.