The Cybereason DFIR team has observed threat actors leveraging email signatures to enhance their phishing lures. Read about their full discovery into the tactic.| www.cybereason.com
In this research, we outline how to enable the execution of 64-bit shellcode via Excel 4.0 macros and previous research on 32-bit shellcode.| www.cybereason.com