Microsoft Exchange Vulnerabilities

Logo
Presented by

Samira Eisaloo

About this talk

A global wave of cyberattacks and data breaches that began in January 2021 after four zero-day vulnerabilities, known collectively as ProxyLogon, were discovered in Microsoft Exchange Server, giving cybercriminals full access to user emails and passwords, administrator privileges on the server, and access to connected devices on the same network. In August 2021, a set of vulnerabilities known as ProxyShell were found. Join eSentire’s Samira Eisaloo, Security Researcher, Advanced Analytics, as she provides an in-depth analysis into three Microsoft Exchange vulnerabilities: ProxyToken, ProxyShell, and ProxyLogon. These vulnerabilities enable cybercriminals to remotely execute code, bypass authentication, and steal mailbox contents on vulnerable Exchange servers. Watch this webinar to learn more about: - How the ProxyShell, ProxyToken, and ProxyLogon vulnerabilities are exploited - Key takeaways from these Microsoft Exchange vulnerabilities - Predictions for potential cyberattacks in 2022, cyberattacks driven by holiday season and Identity-based cyberattacks - How eSentire MDR can help mitigate the ProxyToken, ProxyShell, and ProxyLogon vulnerabilities as a result of our response and remediation capabilities

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (100)
Subscribers (3424)
eSentire, Inc. is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, human expertise, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts and Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Digital Forensic and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.