Tag: Excel
-
How to use PivotTables and PivotCharts in Excel
Using Excel’s PivotTables and PivotCharts, you can quickly analyze large data sets, summarize key data, and present it easy-to-read …
-
It’s time for security operations to ditch Excel
Security teams are hiding an embarrassing secret from the outside world: despite their position at the vanguard of technology, security …
-
Warning: Hackers Exploit 3 Well-known Flaws in Microsoft Word & Excel
Despite not being 0-day or even 1-day vulnerabilities, three well-known and outdated CVEs in Microsoft Word and Excel continue to pose a …
-
3 Well-known Microsoft Word & Excel Flaws Abused by hackers Widely
Despite not being 0-day or even 1-day vulnerabilities, three well-known and outdated CVEs in Microsoft Word and Excel continue to pose a …
-
CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent notice to federal agencies, setting a deadline of January …
-
CISA adds Excel, Chrome flaws to its exploited vulnerabilities catalog
The Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two vulnerabilities on its Known Exploited Vulnerabilities …
-
CISA flags up actively exploited Google Chrome and Excel flaws
The US Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalogue to include …
-
Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware
Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of malware called …
-
New Agent Tesla Variant Uses Excel Exploit to Infect Windows PCs
The new Agent Tesla variant exploits CVE-2017-11882/CVE-2018-0802 vulnerability to execute the malware. Key Findings A new variant of the …
-
How to Organize Your Managed Services Taxonomy & Excel in Key Categories – Craig Robinson – CFH #16
Having a clear and cogent taxonomy that classifies your managed cyber services into distinct buckets or categories is an important step for …
-
Your Office Document is at Risk – XLL, A New Attack Vector
Microsoft office documents are used worldwide by both corporates and home-users alike. It’s different office versions, whether licensed …
●●●