Malicious Document Analysis
Malicious document files are really popular nowadays. Typically, attackers use these files to infiltrate and compromise endpoints and networks. Threat actors have taken advantage of documents by using macros to conduct malicious practices. In this post, we will discuss and analyze malicious documents and uncover hidden indicators of compromise (IOCs). Table of Content What’s a …