SANS Emergency Webcast: Follina MSDT (MS Word) 0-day - Analysis and Remediation w/ Jake Williams

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=vHW_hb2m_pw



Category:
Guide
Duration: 46:34
12,845 views
158


A fascinating Word document was uploaded to a file scanning service last week. Researchers found it over the weekend, and it's clear there's a Zero-day allowing code execution in malicious Office documents. Upon identification, the SANS team went to work investigating the vulnerability and potential remediation of CVE-2022-30190. Join SANS and Jake Williams to learn what we uncovered on how the Follina vulnerability works, how to detect exploitation, and how to remediate.

PPTX Slides on What To Tell Your Boss
In case you are asked to brief management: We do have some PowerPoint slides to get you started. Find them and more information on the vulnerability here: https://isc.sans.edu/forums/diary/New+Microsoft+Office+Attack+Vector+via+msmsdt+Protocol+Scheme/28694/


SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.







Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
Follina
Microsoft Vulnerability
ZeroDay
MSDT
CVE-2022-30190