By posteriori/

Microsoft Office Zero-Day: Detecting the HTA Handler Vulnerability

  ABSTRACT RTF (Rich Text Format) files have been around since 1987 and are often times overlooked and underestimated as being a viable attack vector. Although the RTF version has not been updated since 1.9.1 was released in March 2008, most document READ MORE

Spora Ransomware: Understanding the HTA Infection Vector

  ABSTRACT Recently, the MalwareHunterTeam announced the discovery of new ransomware.  This ransomware, Spora, is one of the most sophisticated examples seen to date.  According to BleepingComputer, Spora has “top notch encryption”, “has the most sophisticated payment site as of yet” and a “professional decryption READ MORE