Cybercriminals are bypassing Microsoft’s blocking of macros in its Office suite by using alternative files to host malware, according to Proofpoint’s Threat Research Team. The usage of macros in malware campaigns has decreased by around 66% between October 2021 and June 2022, following Microsoft’s introduction of macro-blocking features. However, threat actors are now using container files such as ISO and RAR attachments, and Windows Shortcut files to carry malware, with campaigns doing so rising nearly 175% during that period.
Could hackers use a new attack to take down the European power grid?
Researchers have raised concerns that Radio Ripple Control (RRC) technology used in European power grids could be exploited to cause major disruption. They claim an