An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?
Buck
2 hours agoTequila
5 days agoEarleen
8 days agoRashida
9 days agoAshleigh
14 days agoAlonzo
18 days agoKiley
21 days agoAndra
23 days ago