14 November, 2017

Skeleton in the closet. MS Office vulnerability you didn’t know about

Introduction What is the beginning of a typical research? Any research begins with detecting vulnerabilities with common tools. Although the process does not require much time and effort, it works well.Detection procedure is focused on vulnerabilities in third-party libraries used in outdated software and widely known to the IT community. A developer creates different versions […]