Passwords are everywhere in the company, you may need it to manage the access control to resources, accounts or systems. The requirements regarding the management of passwords are based on complexity and policy. Both criteria ensure the quality and strength of the password, therefore the security of the protected resources… but does it really in practice?
In this newsletter, we will learn how today’s malware programs are able to replicate themselves and spread over the network.
Enforced since last 25 May 2018, the GDPR is raising many questions about data privacy concerns for organization within the scope of the regulation. Reaching compliance is necessary to enable your organization to provide strong guarantees towards the way you process the personal data concerning your clients and your employees.
This newsletter will give you an overview of different threats based on Microsoft Office documents able to execute malicious code without using macros. While some of the presented attacks rely on vulnerabilities already patched by Microsoft, others take advantage of legitimate features, and as such can only be mitigated, not completely disabled.