![]() ![]() He launches his attack campaign against Contoso by targeting James, an employee there. ![]() Stewart uses macro-based malware because he’s had recent successes using it. Stewart is a cybercriminal looking to attack and penetrate the Contoso network. After a rash of macro-based malware attacks targeting her organization, she learns of this new feature in Office 2016 and has rolled out a Group Policy update to all Office clients on the network. Let’s walk through a common attack scenario and see this feature in action.Ĭlaudia is an enterprise administrator at Contoso.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |