Attackers can Take Over Computers through PowerPoint Files

Attackers use socially engineered emails with .ppam file attachments that hide malware that can rewrite Windows registry settings on targeted machines. The attacker used under-the-radar PowerPoint files to hide malicious executables that can rewrite Windows registry settings to take over an end user’s computer. It’s one of several ways threat actors recently target desktop users … Continue reading Attackers can Take Over Computers through PowerPoint Files