Microsoft Power Query…The Hacker’s Power
An overview to spotlight how attackers exploit Microsoft feature to their advantage
Read More
Magic Mirror Project
Step-by-Step project overview
Read More
DDE Attack
An overview about attack that exploit DDE technology, how it works and why it is so dangerous
Read More