SANS Emergency Webcast MSDT (MS Word) 0-day - Analysis and Remediation
This past weekend, researchers discovered a Word document with a zero-day vulnerability allowing code execution in malicious Office documents. Attackers have been exploiting this for at least a month in targeted attacks. SANS has partnered with the community to create resources to assist in dealing with this MS-MSDT vulnerability (CVE-2022-30190, aka "Follina") and today (Tuesday) at 5pm EDT we will be holding an emergency webinar to go over the threat and our recommendations. Join SANS and Jake Williams to learn what we uncovered on how the vulnerability works, how to detect exploitation, and how to remediate. Go to https://www.sans.org/webcasts/emergency-webcast-msdt-ms-word-0-day/ for the webinar, and https://isc.sans.edu/diary/28694/ for a technical summary of the threat.