Security Webinar Takeaway: Abusing Microsoft Office for Post-ExploitationMy key takeaways putting a wll file (which is a renamed dll) in a ... Read More