The cyber security expert: It’s easy, thanks to rules to identify specific set of binaries. But it also needs manual analysis to confirm if the threat is real o fake.
Yoroi-Cybaze cyber security experts: cybercrime and state-sponsored hackers use simple social engineering tricks to lure users to enable the malicious Macros.