Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Trojan Exploits Known Hole in Microsoft Office (February 9, 2012)

February 16, 2012 Author: Category: Greg's Blog

Wow! It’s an incident handler’s Christmas morning, tools, tools, tools. Very Applicable!
-Todd Davis, Symantec

Article source: http://www.sans.org/newsletters/newsbites/newsbites.php?vol=14&issue=13&rss=Y#sID309

View full post on National Cyber Security

Related

Posted in Greg's BlogTagged 2012., exploits, February, hole, known, Microsoft, Office, Trojan

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved