Malicious email attachments with macros are one of the most common ways hackers get in through the door. Huntress security researcher John Hammond discusses how threat hunters can fight back.
Why the Next-Generation of Application Security Is Needed
Cerberus last edited by
New software and code stand at the core of everything we do, but how well is all of this new code tested? Luckily, autonomous application security is here.