Additional Resources
Stay up to date with the latest findings on the New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) and download Management Guides (.pptx and .pdf) to help you prepare for briefings
A fascinating Word document was uploaded to a file scanning service last week. Researchers found it over the weekend, and it's clear there's a Zero-day allowing code execution in malicious Office documents. Upon identification, the SANS team went to work investigating the vulnerability and potential remediation. Join SANS and Jake Williams to learn what we uncovered on how the vulnerability works, how to detect exploitation, and how to remediate.
Stay up to date with the latest findings on the New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) and download Management Guides (.pptx and .pdf) to help you prepare for briefings