(no title)
deeringc | 2 years ago
That software is almost certainly running on a network-connected machine though and likely has email access etc.. A spear-phising attack with a CAD file that contains an RCE exploit would be an excellent way to compromise that user and machine leading to attacks like industrial espionage, ransomwear, etc...
hgs3|1 year ago
yjftsjthsd-h|1 year ago
GrumpySloth|1 year ago