Just Opening A Document in LibreOffice Can Hack Your Computer (Unpatched)

Are you using LibreOffice?

You should be extra careful about what document files you open using the LibreOffice software over the next few days.

That’s because LibreOffice contains a severe unpatched code execution vulnerability that could sneak malw… Continue reading Just Opening A Document in LibreOffice Can Hack Your Computer (Unpatched)

Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer

Cybersecurity researchers have revealed an unpatched logical flaw in Microsoft Office 2016 and older versions that could allow an attacker to embed malicious code inside a document file, tricking users into running malware onto their computers.

Discov… Continue reading Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer

Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware

Security researchers have spotted a new malware campaign in the wild that spreads an advanced botnet malware by leveraging at least three recently disclosed vulnerabilities in Microsoft Office.

Dubbed Zyklon, the fully-featured malware has resurfaced … Continue reading Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware

Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs

A recently disclosed severe 17-year-old vulnerability in Microsoft Office that lets hackers install malware on targeted computers without user interaction is now being exploited in the wild to distribute a backdoor malware.

First spotted by researcher… Continue reading Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs

17-Year-Old MS Office Flaw Lets Hackers Install Malware Without User Interaction

You should be extra careful when opening files in MS Office.

When the world is still dealing with the threat of ‘unpatched’ Microsoft Office’s built-in DDE feature, researchers have uncovered a serious issue with another Office component that could al… Continue reading 17-Year-Old MS Office Flaw Lets Hackers Install Malware Without User Interaction