https://www.fireeye.com/blog/threat-research/2016/05/how_rtf_malware_evad.html … How on earth could any DLP workflow involve putting a PE in an RTF? And what DLP?pic.twitter.com/reKosieJJh
0 replies
1 retweet
3 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.