March 15, 2024, 3:10 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

 


In February 2024, still-Supported Microsoft Outlook versions got an official patch for CVE-2024-21413,
a vulnerability that allowed an attacker to execute arbitrary code on user's computer when the user opened a malicious hyperlink in attacker's email.

The vulnerability was discovered by Haifei Li of Check Point Research, who also wrote a detailed analysis. Haifei reported it as a bypass for an existing security mechanism, whereby Outlook refuses to open a file from a shared folder on the Internet …

arbitrary code attacker check check point code code execution computer cve cve-2024-21413 email february february 2024 malicious microsoft microsoft outlook monikerlink official outlook patch point remote code remote code execution research vulnerability

Intern, Cyber Security Vulnerability Management

@ Grab | Petaling Jaya, Malaysia

Compliance - Global Privacy Office - Associate - Bengaluru

@ Goldman Sachs | Bengaluru, Karnataka, India

Cyber Security Engineer (m/w/d) Operational Technology

@ MAN Energy Solutions | Oberhausen, DE, 46145

Armed Security Officer - Hospital

@ Allied Universal | Sun Valley, CA, United States

Governance, Risk and Compliance Officer (Africa)

@ dLocal | Lagos (Remote)

Junior Cloud DevSecOps Network Engineer

@ Accenture Federal Services | Arlington, VA