Attackers are using socially engineered emails with .ppam file attachments that hide malware that can rewrite Windows registry settings on targeted machines.
Source: Healthcareitnews.com and Read More

Navigating Cybersecurity Frameworks – CISO Resource Guide
The role of the Chief Information Security Officer (CISO) is crucial amid evolving cyber threats. Selecting the right cybersecurity framework aligns risk management with organizational