Microsoft has pulled back on its decision to block downloaded Excel files containing macros by default. They have said they will push this change out again in the future. If you were caught flat-footed by this decision and suddenly couldn’t figure out how to unblock your Excel files that you relied upon, you need to act before Microsoft rolls this out again. Evaluate now why you are allowing such risky behavior and how you can better protect your firm.
While Microsoft pulled back from this decision, I urge you to look for additional ways to protect users from phishing lures and attack vectors that include malicious Office files. Because many of these attacks come via email, but not necessarily as email attachments, evaluate whether your phishing protection and user education are appropriate. I’ve seen many a phishing lure come in via web links, pretend cloud services, and other techniques that bypass traditional antivirus and file filtering.
More Stories
US Blocks Foreign Governments from Acquiring Citizen Data
The US government has implemented a program that applies export controls on data transactions to certain countries of concern, including...
China Sort of Admits to Being Behind Volt Typhoon
The Wall Street Journal has the story: Chinese officials acknowledged in a secret December meeting that Beijing was behind a...
Digital Certificate Lifespans to Fall to 47 Days by 2029
CA/Browser Forum members have voted in favor of shortening TLS/SSL certificate lifespans to 47 days Read More
AI Hallucinations Create “Slopsquatting” Supply Chain Threat
Experts have warned that threat actors could hijack AI hallucinations in “slopsquatting” attacks Read More
Medusa ransomware gang claims to have hacked NASCAR
Read more in my article on the Hot for Security blog. Read More
NVD Revamps Operations as Vulnerability Reporting Surges
The NVD program manager has announced undergoing process improvements to catch up with its growing vulnerability backlog Read More