June 1, 2022, 12:22 a.m. | SANS Institute

SANS Institute www.youtube.com

A fascinating Word document was uploaded to a file scanning service last week. Researchers found it over the weekend, and it's clear there's a Zero-day allowing code execution in malicious Office documents. Upon identification, the SANS team went to work investigating the vulnerability and potential remediation of CVE-2022-30190. Join SANS and Jake Williams to learn what we uncovered on how the Follina vulnerability works, how to detect exploitation, and how to remediate.

PPTX Slides on What To Tell Your Boss …

analysis emergency follina jake williams msdt remediation sans webcast williams word

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Junior Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate Director, Operations Compliance and Investigations Management

@ Legend Biotech | Raritan, New Jersey, United States

Analyst, Cyber Operations Engineer

@ BlackRock | SN6-Singapore - 20 Anson Road

Working Student/Intern/Thesis: Hardware based Cybersecurity Training (m/f/d)

@ AVL | Regensburg, DE