You searched for 0199 2017 | SC Media

Your search for 0199 2017 returned 14 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for 0199 2017 returned 14 results

Sort Results:

Relevant Recent

Did you mean: 0109 2017


Top 10 vulnerabilities used by cybercriminals

Recorded Future released a report revealing the top 10 vulnerabilities exploited by cybercriminals in 2017. Microsoft and Adobe products accounted for all 10 with seven belonging to the former and three the latter company.  According to the report, the most commonly abused vulnerability last year was CVE-2017-0199, a remote code execution vulnerability in Microsoft Office…
Microsoft4 (1)

New and old Windows vulnerabilities top Alienvault list

Adobe’s Flash Player may gain a lot of negative headlines, but when it comes to the most frequented targeted software Microsoft Office and Windows beat out the much maligned Adobe software. A new report from Alienvault, the first in a series of three, based on numbers from the company’s Open Threat Exchange (OTX) platform found…

Malicious PowerPoint Slide Show files exploit Microsoft bug to deliver REMCOS RAT

In what researchers are calling a first, malware distributors are now maliciously crafting PowerPoint Open XML Slide Show (PPSX) files to take advantage of a Microsoft Office vulnerability that is more typically exploited with Rich Text File documents. The bug in this case is CVE-2017-0199, a vulnerability in Microsoft Office’s Windows Object linking and Embedding interface, according to…

New Backdoor targets Russian businesses in apparent spear phishing campaign

What appears to be an ongoing spear phishing campaign has been targeting Russian-speaking businesses, including banks and mining firms, with a newly discovered backdoor malware program since late June, according to researchers at Trend Micro. The backdoor, whose final payload is a malicious XML file by the name of JS_GETFO.ZHEG-A, is capable of downloading and…
Next post in Cybercrime