In the past week, we’ve provided 3rd party assessments on multiple organizations’ Microsoft Exchange Servers. On EVERY SINGLE ONE, we found previously undetected risks pertaining to the Microsoft Exchange HAFNIUM Vulnerability.
Why is this so dangerous? The Microsoft patch is not guaranteed to apply correctly, the bad actors had a head start, and the complexity of these servers makes detection difficult. Even if the patch was successfully applied, there‘s still a 1–in–5 chance that malicious code infected your servers before the patch was released. And if you DID NOT apply the patch immediately, you are almost certainly compromised.
Join us as Jerel Howland, CTO at Mytech, Nate Austin, VP of Business Development at Mytech, and Dave Kleinatland, Senior Security Engineer at Huntress break down:
- Why the Microsoft Exchange Zero-Day threat is different and more dangerous than any other we’ve encountered.
- Real-life examples of exploits we’ve already found, and exploits that might still be lying in wait.
- Recommended next actions – how to make sure you’re protected right now.
If you have any doubt of whether your organization may still be at risk from the 2021 Microsoft Exchange Zero-Day Vulnerability - reach out and within hours we can find out.
[ Ссылка ]
Ещё видео!