Weaponization of Excel Add-Ins Part 2: Dridex Infection Chain Case Studies Posted onMay 19, 2022May 20, 2022AuthorCyber Security Review In Part 1 of this two-part blog series, Unit 42 researchers discussed briefly how XLL files are explSubscribe or log in to read more.