Attacks leveraging the BYOB framework for fraudulent activity in the wild has been around for a few years now. We believe that the cyber security community can expect to see much more of this as more “script kiddies” discover the BYOB tool. What is BYOB (Build Your Own Botnet)? In today’s cyber security world, the […]
In this post we discuss how a cyber attack involving malicious macro code was disguised as a CV delivered via email.