Have a suggestion?
Click here to suggest a blog item.
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
July 30, 2018
June 24, 2018
Apr 2, 2018
Apr 2, 2018
Feb 24, 2018
Jan 14, 2018
Major Site News
Jan 10, 2018
The Silent MajorityEven though I have not contributed anything to the discussions I follow the site every day. I find the discussions interesting and informative. I think it's a nice community.
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
You are viewing a specific blog item. Click here to return to the main blog page.
Talos said the exploit is being distributed through a Microsoft Excel document that has a malicious Flash object embedded into it. Once the SWF object is triggered, it installs ROKRAT, a remote administration tool Talos has been tracking since January 2017. Until now, the group behind ROKRAT—which Talos calls Group 123—has relied on social engineering or exploits of older, previously known vulnerabilities that targets hadn't yet patched. This is the first time the group has used a zeroday exploit.