Remove category templates
article thumbnail

A Report Template for Incident Response

Lenny Zeltser

Preparation also includes creating a template that the team can use as the basis for the incident report, which is critical to ensuring that the incident is handled well. We created such an incident report template when we developed our incident response procedures at Axonius. What lessons can be learned?

article thumbnail

Multiple Microsoft Office versions impacted by an actively exploited zero-day

Security Affairs

The document uses the remote template feature to fetch an HTML and then uses the “ms-msdt” scheme to execute PowerShell code. “The document uses the Word remote template feature to retrieve a HTML file from a remote webserver, which in turn uses the ms-msdt MSProtocol URI scheme to load some code and execute some PowerShell.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercriminals Use Azure Front Door in Phishing Attacks

Security Affairs

Based on the analyzed templates, the attackers are likely using an automated way to generate their phishing letters, by doing so they’re able to scale their campaigns to ultimately target a broader number of customers globally, which has previously been observed in spam strains delivered with Emotet and Oakbot. To nominate, please visit:?.

Phishing 127
article thumbnail

Microsoft shared workarounds for the Microsoft Office zero-day dubbed Follina

Security Affairs

The document uses the remote template feature to fetch an HTML and then uses the “ms-msdt” scheme to execute PowerShell code. The document uses the Word remote template feature to retrieve a HTML file from a remote webserver, which in turn uses the ms-msdt MSProtocol URI scheme to load some code and execute some PowerShell.”

article thumbnail

Another nation-state actor exploits Microsoft Follina to attack European and US entities

Security Affairs

The document uses the Word remote template feature to retrieve a HTML file from a remote webserver, which in turn uses the ms-msdt MSProtocol URI scheme to load some code and execute some PowerShell.” The document uses the remote template feature to fetch an HTML and then uses the “ms-msdt” scheme to execute PowerShell code.

Phishing 106
article thumbnail

China-linked TA413 group actively exploits Microsoft Follina zero-day flaw

Security Affairs

The document uses the remote template feature to fetch an HTML and then uses the “ms-msdt” scheme to execute PowerShell code. Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. This week, the cybersecurity researcher nao_sec discovered a malicious Word document (“05-2022-0438.doc”)

Malware 104
article thumbnail

Gut Check: Are You Getting the Most Value out of Your Penetration Testing Report?

NetSpi Executives

We’ve got you covered with this Penetration Testing RFP template. Prioritize high-severity vulnerability findings, while tackling the subsequent categories over time. Use this article and the penetration testing report examples below to make sure reports you receive speak to prioritized findings backed up with sound methodology.