Lucy Security AG
Get insight on how your systems handle different variations of potentially dangerous file types
Through a phishing simulation, you find out that some of your employees activate macros in Word documents. But what harm could a real attacker do with such a macro? Are there any other file types that an attacker could deliver to your employees? These and other questions will be answered in the technical tests. The e-mail and internet malware filter test gives you an insight on how your mail server and web proxy handle different variations of potentially dangerous file types. You can thus see whether potential malicious code, such as java files, backdoors, scripts, embedded office objects, etc. are detected and blocked by the infrastructure. Based on these results, you can then carry out targeted phishing campaigns or close discovered gaps.