This post has been republished via RSS; it originally appeared at: Microsoft Security Blog.
This guide provides steps organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2023-23397.
The post Guidance for investigating attacks using CVE-2023-23397 appeared first on Microsoft Security Blog.