• Home
    • Blog
    • Support
    • Live
  • Get Support
    • USA (ENGLISH)
    • AUSTRALIA (ENGLISH)
    • BRAZIL (PORTUGUÉS)
    • CANADA (ENGLISH)
    • CHINA (简体中文)
    • FRANCE (FRANÇAIS)
    • GERMANY (DEUTSCH)
    • INDIA (ENGLISH)
    • ITALY (ITALIANO)
    • JAPAN (日本語)
    • KOREA (한국어)
    • LATIN AMERICA (ESPAÑOL)
    • MEXICO (ESPAÑOL)
    • SINGAPORE (ENGLISH)
    • SPAIN (ESPAÑOL)
    • TAIWAN (繁體中文)
    • UK (ENGLISH)
  • Home
  • Blog
  • Support
  • Live
  • What We Do
  • Products
  • Services
  • Resources
  • Partners
  • Company
  • Get Support
  • EN [change]
Blog Home > Microsoft Office
Josh Grunzweig
Josh Grunzweig, February 10, 2017
EDITION: Unit 42
Unit 42

Unique Office Loader Deploying Multiple Malware Families

Unit 42 analyzes unique office loader that leverages malicious macros that are used to deploy numerous malware families. …
7,662 (0)
Christopher Budd
Christopher Budd, December 16, 2016
EDITION: Unit 42
Unit 42

Palo Alto Networks Unit 42 Vulnerability Research Decem…

As part of Unit 42’s ongoing threat research, we can now disclose that Palo Alto Networks Unit 42 researchers have reported six vulnerabilities that have been fixed by Apple, Adobe and Microsoft. Th …
8,401 (1)
Robert Falcone
Robert Falcone, July 20, 2016
EDITION: Threat Prevention, Uncategorized, Unit 42
Unit 42

Technical Walkthrough: Office Test Persistence Method U…

As mentioned in our previous blog, we observed the Sofacy group using a new persistence mechanism that we call “Office Test” to load their Trojan each time the user opened Microsoft Office applica …
5,030 (0)
Bryan Lee
Bryan Lee and Josh Grunzweig, December 22, 2015
EDITION: Malware, Unit 42
Unit 42

BBSRAT Attacks Targeting Russian Organizations Linked t…

In late 2014, ESET presented an attack campaign that had been observed over a period of time targeting Russia and other Russian speaking nations, dubbed “Roaming Tiger”. The attack was found to he …
129,121 (1)

SUBSCRIBE TO NEWSLETTERS

company

  • Company
  • Careers
  • Sitemap
  • Report a Vulnerability

LEGAL NOTICES

  • Privacy
  • Terms of Use
  • Documents
  • GDPR Readiness

ACCOUNT

  • Manage Subscription

Trending Topics

  • Cloud Security: Top 3 Security Considerations
  • What is Cybersecurity?
  • Endpoint Protection
  • SaaS Security: A Next-Generation Platform Approach
  • Advanced Endpoint Protection Protects You From Dated Antivirus

© 2018 Palo Alto Networks, Inc. All rights reserved.

  • SALES > 866.320.4788
    • Request a Call Back
    • Find a local office
    • Find a partner
  • SEE A DEMO
    • Attend live webcast
    • Watch on-demand
    • Schedule meeting
    • Free threat assessment
  • TEST DRIVE FROM HOME