Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Ancient Microsoft Word Exploit Unleashes Cyber Mayhem on Taiwanese Drone Makers
Attackers are using an old version of Microsoft Word to target Taiwanese drone makers. Dubbed “WordDrone,” this cyber espionage campaign leverages a DLL side-loading technique to install a persistent backdoor. Researchers discovered the attack while investigating strange processes in an ancient version of Microsoft Word.…

Hot Take:
Who knew that a throwback to Microsoft Word 2010 would be this season’s hottest trend in cyber espionage? Retro is back, baby, and it’s packing a malware punch!
Key Points:
- Attackers are using an old version of Microsoft Word to deliver malware in a campaign dubbed “WordDrone.”
- The attack targets Taiwanese drone makers, aiming at cyber espionage and disrupting military and satellite supply chains.
- The attack involves a DLL side-loading technique to install a persistent backdoor called ClientEndPoint.
- Researchers found similarities between this attack and a previous campaign called “TIDrone,” which also targeted Taiwanese drone makers.
- The attackers exploit vulnerabilities in an ERP software popular among Taiwanese companies to gain initial access.

