Macros are special-purpose programs used to automate procedures within a bigger application or software. Usually a macro consists of a series of commands and actions written in a dedicated Macro Language or a standard programming language.| All-in-One Cybersecurity Platform - Cynet
Analysis of a recent phishing campaign targeting Ukrainian entities using Russian war crimes themes. (Computer Emergency Response Team of Ukraine) | CyberScoop
Source: Getty Images | CyberScoop
The BlackBerry Threat Research and Intelligence team has uncovered malicious lures targeting guests of the upcoming NATO Summit who may be providing support to Ukraine. Our analysis leads us to believe that that the threat actor known as RomCom is likely behind this operation.| blogs.blackberry.com
The documents contained malicious VBA code, indicating they may be used as lures to infect organizations.| Cisco Talos Blog
Cisco Talos has discovered a threat actor conducting several campaigns against government entities, military organizations and civilian users in Ukraine and Poland. We judge that these operations are very likely aimed at stealing information and gaining persistent remote access.| Cisco Talos Blog
Cisco Talos discovered Gamaredon APT activity targeting users in Ukraine with malicious LNK files distributed in RAR archives.| Cisco Talos Blog
Russian President Vladimir Putin chairs a Security Council meeting via a video link at the Kremlin in Moscow on July 28, 2022. (Photo by PAVEL BYRKIN/SPUTNIK/AFP via Getty Images) | CyberScoop
The original stock picture (left) and an AI fake (right) used by a North Korean threat actor who posed as a U.S.-based software engineer and was hired by the cyber firm KnowBe4. (Photo credit: KnowBe4) | CyberScoop