Have you ever received an empty email and wondered if it might be a reconnaissance attack? What if opening such an email in your Microsoft Outlook client triggered an attack path? Microsoft's latest CVE-2024-30103 and CVE-2024-38021 unleashed Microsoft Outlook chaos.
Watch our session with Gartner Veteran and CMO Brad LaPorte as he moderates this informative session with Morphisec CTO and Head of Malware Research Michael Gorelik and Malware Researcher Arnold Osipov as they reveal how Morphisec's critical discovery of vulnerability CVE-2024-30103 led to additional Outlook remote code execution (RCE) vulnerability discoveries.
During this webinar, we dive into the technical details of CVE-2024-30103 and 2024-38021 as presented on the main stage at the DEF CON 32 conference in Las Vegas.
CVE-2024-30103 is an RCE vulnerability that impacts most Microsoft Outlook clients. This zero-click vulnerability allows attackers to execute arbitrary code simply by having the email opened, without requiring any user interaction. We discuss the discovery process, the potential impact of this vulnerability, and the urgent need for patching.
Additionally, we provide insights into what it takes to run an industry-leading cyber threat research team. Learn about the best practices in methodology and approach, as well as the expertise required to conduct cutting-edge cybersecurity research.
Watch this technical deep dive on-demand that covers:
Don't miss this chance to gain critical insights and learn how to protect your systems from emerging threats. Watch now!
Michael Gorelik | CTO & Head of Malware Research
Arnold Osipov | Malware Researcher
Brad Laporte | CMO | Moderator