Responding to a Reported Zero Day Exploit Using the Exchange Server On-Prem Hafnium Attack as the Example

Webinar Registration

The recent vulnerability divulged by Microsoft that affected hundreds of thousands of on-premises Microsoft Exchange servers running versions 2013 through 2019 was taken advantage of just **3 days later** by an aggressive Chinese cyber espionage unit in an attack dubbed “Hafnium”, attempting to download internal email - with over 30,000 organizations impacted in just the United States alone.

This vulnerability allows attackers to take control of Internet-facing Exchange servers, leaving the door open for continued attacks. This news highlights the lack of response planning and execution that exists within organizations when critical flaws like the one empowering the Hafnium attack are identified.

In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat in this webcast to take a look at critical zero-day vulnerabilities and how to respond to them. Topics will include:

  • The Hafnium attack and its associate vulnerability
  • Other kinds of reported zero-day attacks
  • Formulating an appropriate response

Nick will then be joined by Kev Breen and Chris Pace of Immersive Labs who will do a deep dive into the Hafnium attack, providing insight into this attack from two perspectives:

  • First, they’ll demonstrate the attack – from threat actions to exfiltration of email.
  • Next, they’ll use one of Immersive Lab’s very cool crisis simulations to test your skills to see how you should respond to an incident of this caliber.

This real training for free event will be jam packed with technical detail and real-world application. Register today!

First Name:   
Last Name:   
Work Email:  
Job Title:  

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.



Upcoming Webinars
    Additional Resources