CVE STALKER

CVE-2022-30190

CVSS9
DESCRIPTIONMicrosoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
HEAT SCORE7754

WORDS

TWEETS

DATE TWEETS USER
2023-02-21 10:38:08Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/M2QWjzTnJH https://bit.ly/3KkNgStSasStu
2023-02-16 02:00:50【ブログ:#MS診断ツール の #ゼロデイ脆弱性 Follina(CVE-2022-30190)】 本ブログでは、#Follina として知られるCVE-2022-30190についての詳細を #Tanium を用いて解説しておりま… https://t.co/e63TvsjfuK https://twitter.com/i/web/status/1626038654203465728TaniumJ
2023-02-13 21:15:36New post from https://t.co/uXvPWJy6tj (CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス) has been published on https://t.co/dgUADXe4Ku http://www.sesin.at https://www.sesin.at/2023/02/13/cve-2022-30190-%e3%83%9e%e3%82%a4%e3%82%af%e3%83%ad%e3%82%bd%e3%83%95%e3%83%88-%e3%82%b5%e3%83%9d%e3%83%bc%e3%83%88%e8%a8%ba%e6%96%ad%e3%83%84%e3%83%bc%e3%83%ab%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7/WolfgangSesin
2023-02-13 21:14:55New post from https://t.co/9KYxtdZjkl (CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス) has been published on https://t.co/SU8ry5Dps0 http://www.sesin.at https://www.sesin.at/2023/02/13/cve-2022-30190-%e3%83%9e%e3%82%a4%e3%82%af%e3%83%ad%e3%82%bd%e3%83%95%e3%83%88-%e3%82%b5%e3%83%9d%e3%83%bc%e3%83%88%e8%a8%ba%e6%96%ad%e3%83%84%e3%83%bc%e3%83%ab%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7/www_sesin_at
2023-02-10 20:20:44Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/CqmNVxPew9 via @YouTube https://youtu.be/dGCOhORNKRksagcast452
2023-02-02 05:20:20Email Subject: Amended Doc W9 and Excell 418b232a17416dcbff34781f493ea06c 1. #Follina CVE-2022-30190 W9.docm fd384… https://t.co/XEI1efuwoH https://twitter.com/i/web/status/1621014077568069633StopMalvertisin
2023-01-27 14:01:56Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability #2022 #Microsoft #Monday… https://t.co/A4Ythp5HPw https://twitter.com/i/web/status/1618969611214675969sebaenetworks
2023-01-20 18:24:381️⃣ #Follina (CVE-2022-30190) Allows an attacker to execute arbitrary code with the privileges of the current use… https://t.co/ULJwzCuQBw https://twitter.com/i/web/status/1616499743957610496SentinelOne
2023-01-20 09:58:46Reminds me of my CVE-2022-30190 bug, they missed it at first, but didn't give me a bounty. But this one is ridiculo… https://t.co/srT9D7YRdS https://twitter.com/i/web/status/1616370228447047682CrazymanArmy
2023-01-13 19:20:46Woohoo just entered top 100000 on THM Learned and executed Follina MSDT - CVE-2022-30190 another landmark a few w… https://t.co/pfD97jMg7Z https://twitter.com/i/web/status/1613978688563077121justin_dwins
2022-12-28 07:30:42⚠️WordPressのギフトカードプラグインの脆弱性をハッカーが悪用(CVE-2022-45359) 💡2022年に特に多く悪用された脆弱性8選(CVE-2022-30190、CVE-2017-11882など) 💰Faceb… https://t.co/a7sawmFIVd https://twitter.com/i/web/status/1608001197738455046MachinaRecord
2022-12-04 20:16:36Top 10 exploited vulnerabilities in 2022 1.Log4Shell (CVE-2021-44228) 2.Follina (CVE-2022-30190) 3.Spring4Shell (C… https://t.co/EH7dacwcIb https://twitter.com/i/web/status/1599495693563203585NandanLohitaksh
2022-11-29 22:00:501. Follina (CVE-2022-30190) 2. Log4Shell (CVE-2021-44228) 3. Spring4Shell (CVE-2022-22965) 👇👇👇cybersecnotes
2022-11-29 13:00:341. Follina(CVE-2022-30190) 2. Log4Shell(CVE-2021-44228) 3. Spring4Shell(CVE-2022-22965) 4. F5 BIG-IP(CVE-2022-1388)… https://t.co/vz38YHvq28 https://twitter.com/i/web/status/1597571635292536832n0ipr0cs
2022-11-28 12:33:561. Follina (CVE-2022-30190) 2. Log4Shell (CVE-2021-44228) 3. Spring4Shell (CVE-2022-22965)thebinarybot
2022-11-27 09:02:55If Indian tech scammers ever found out about CVE-2022-30190 we would have been finishedItLooksSadistic
2022-11-25 09:52:43Cobalt Strike Beacon with CVE-2021-40444 and CVE-2022-30190 (Follina) exploits are being used in email phishing att… https://t.co/24qZsZXiCq https://twitter.com/i/web/status/1596077895226888193AnonOpsRise
2022-11-18 22:47:02BSidesKC 2022 – Grant Shanklin’s ‘Trouble With The Troubleshooter; A Primer On CVE-2022-30190’ https://t.co/g1qxj9vjWL https://securityboulevard.com/2022/11/bsideskc-2022-grant-shanklins-trouble-with-the-troubleshooter-a-primer-on-cve-2022-30190/InfoSecUSA
2022-11-18 22:31:32BSidesKC 2022 – Grant Shanklin’s ‘Trouble With The Troubleshooter; A Primer On CVE-2022-30190’ https://t.co/G4a7l0PuMT https://securityboulevard.com/2022/11/bsideskc-2022-grant-shanklins-trouble-with-the-troubleshooter-a-primer-on-cve-2022-30190/filipe_f_silva
2022-11-18 22:03:37BSidesKC 2022 – Grant Shanklin’s ‘Trouble With The Troubleshooter; A Primer On CVE-2022-30190’ https://t.co/dwJ9Y4E55d https://securityboulevard.com/2022/11/bsideskc-2022-grant-shanklins-trouble-with-the-troubleshooter-a-primer-on-cve-2022-30190/security_inside
2022-11-18 21:42:58BSidesKC 2022 – Grant Shanklin’s ‘Trouble With The Troubleshooter; A Primer On CVE-2022-30190’: Our sincere thanks… https://t.co/nRToGUtlyt https://twitter.com/i/web/status/1593716957899284480cipherstorm
2022-11-12 11:51:01Cobalt Strike Beacon with CVE-2021-40444 and CVE-2022-30190 (Follina) exploits are being used in email phishing att… https://t.co/7OBUK1KGAo https://twitter.com/i/web/status/1591397472198615041cybermoonsec
2022-11-08 18:34:48Demonstration of Attack Exploiting CVE-2022-30190 by Cato Networks https://t.co/0uQtioyyl5annexustech
2022-11-08 17:12:481.CVE-2017-11882 2.CVE-2022-30190 3.CVE-2022-2294 The three most common security vulnerabilities, according to a r… https://t.co/QYBmayxnri https://twitter.com/i/web/status/1590028625226924032ArubaEMEA
2022-11-04 18:52:04CVE-2022-30190 Follina POC. Contribute to onecloudemoji/CVE-2022-30190 development by creating an account on GitHu… https://t.co/BEOy6w7l5P https://twitter.com/i/web/status/1588602743450570752hsianghui
2022-11-04 11:42:54#Follina Exploit Leads to Domain Compromise "In this intrusion, a threat actor abused the CVE-2022-30190 (Follina)… https://t.co/ZRbxLNICP9 https://twitter.com/i/web/status/1588494453211529217seguridadyredes
2022-11-04 08:00:24CVE-2022-30190分析 https://t.co/czvZXXNVwE https://t.co/65z3ZowHHo https://ift.tt/9r2bg61 https://ift.tt/N1iweWfbuaqbot
2022-11-03 10:21:03Emerging Threats 🧵 [1/4] Follina (CVE-2022-30190) or the remote code execution vulnerability discovered that will a… https://t.co/7cMqaYrj4y https://twitter.com/i/web/status/1588112713447866368hacker_ware
2022-10-28 22:06:581. CVE-2017-11882, a security flaw in Microsoft Office. 2. CVE-2022-30190. a high-severity zero-day vulnerability… https://t.co/42Pd8TxrUa https://twitter.com/i/web/status/1586066694153580544anilcyen
2022-10-28 20:31:521. CVE-2017-11882, a security flaw in Microsoft Office. 2. CVE-2022-30190. a high-severity zero-day vulnerability… https://t.co/42Pd8TxrUa https://twitter.com/i/web/status/1586066694153580544anilcyen
2022-10-28 19:43:17CVE-2022-30190를 구현중인데.. MSDT 패스키를 얻을 수 있는 방법 아시는분... 있으신가요.. 세미나 준비하는데 저기서 막혀버리네요.. #해킹 #취약점 #MSDT https://t.co/HEs6MsEyQSchoisun0454
2022-10-27 23:01:02@ExcelHumor CVE-2022-30190 right now mostlyscp_localhost
2022-10-27 13:13:09Some attacks haven't changed, such as the 0-day #vulnerability in MSDT Follina (CVE-2022-30190) that doesn't requir… https://t.co/CzsGKR5vgR https://twitter.com/i/web/status/1585617500968046595hexensio
2022-10-24 06:21:21CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files https://t.co/9bcN1FikcA https://www.reddit.com/r/netsec/comments/x6aqwc/cve202230190_aka_follina_uses_macroless_word_docs/?utm_source=dlvr.it&utm_medium=twittertechadversary
2022-10-20 14:19:44CVE-2022-30190 OU LA VULNÉRABILITÉ FOLLINA ! #cybersecurity #centredeformation #antivirus #virus #Cyberattaques 💻🛠️ https://t.co/wenFYBP9Fptspit_school
2022-10-20 08:30:22Follina CVE-2022-30190 opendir 18.181.220.197:9001 https://t.co/iWdGTPSxCVMichalKoczwara
2022-10-12 12:43:02In 2022 #WoodyRAT was spread through MS Word doc with exploit for CVE-2022-30190 #Follina vuln, HTM-loader and C2 d… https://t.co/JvT01ie1GS https://twitter.com/i/web/status/1580173975740510208_MalwareHunters
2022-10-09 19:32:01Messing with CVE-2022-30190 by Understanding Compound File Binary Format and OLE Structures https://t.co/XzBoUSA8Nr https://cymulate.com/blog/cve-2022-30190-2/axcheron
2022-10-09 08:40:13Messing with CVE-2022-30190 by Understanding Compound File Binary Format and OLE Structures https://t.co/BH8eiVlD3X https://t.co/NiZGnX2adz https://ift.tt/9oWLz5D https://ift.tt/jgnFmZGbuaqbot
2022-10-07 01:21:52One such zero-day vulnerability that was resolved earlier this year was Follina (CVE-2022-30190), which granted hac… https://t.co/a7SwKgWXgh https://twitter.com/i/web/status/1578191751155658753Naro08689546
2022-10-06 01:12:00@StopMalvertisin @1ZRR4H @luigi_martire94 Mentioned #Follina CVE-2022-30190 sample + extra 👇👇👇👇… https://t.co/GJ3Dn4NLYJ https://twitter.com/i/web/status/1577826460399722496JAMESWT_MHT
2022-10-05 17:01:22#Follina CVE-2022-30190 eb5e57e7db3af792b4c9e9f28525843b Danh sách cán bộ tham dự hội thảo Chuyển đổi số Quốc gia… https://t.co/quEdhW193u https://twitter.com/i/web/status/1577704142516105219StopMalvertisin
2022-09-30 02:10:10.@FortiGuardLabs Threat Signal Report: Qakbot Delivered Through CVE-2022-30190 (Follina) ⮕ https://t.co/BgaIf2fpUi https://t.co/lRBhGtzgHw https://ftnt.net/6015Mwo3Waaronokia
2022-09-27 02:34:52.@FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The… https://t.co/iRN4XyWWME https://twitter.com/i/web/status/1574580022718906376aaronokia
2022-09-26 23:43:03The intrusions involved the exploitation of CVE-2022-1040 and CVE-2022-30190 (aka "Follina"), two remote code execu… https://t.co/OrcRx5BmAz https://twitter.com/i/web/status/1574543089313763348MalwarePatrol
2022-09-25 17:20:31ID: CVE-2022-30190 https://t.co/jzqFlUbWpO https://www.bleepingcomputer.com/news/security/new-windows-search-zero-day-added-to-microsoft-protocol-nightmare/anon13359306
2022-09-25 14:12:22The CVE-2022-30190 (Follina) Microsoft Office exploit is currently being deployed in email phishing attacks on Ukra… https://t.co/NlpjtFO46u https://twitter.com/i/web/status/1574036510034530304cybermoonsec
2022-09-25 14:10:48Cobalt Strike Beacon with CVE-2021-40444 and CVE-2022-30190 (Follina) exploits are being used in email phishing att… https://t.co/dY9fx78ZQN https://twitter.com/i/web/status/1574037773971230725ninjadragonsec
2022-09-19 01:10:11The Windows MSDT vulnerability CVE-2022-30190 code name Follina was an exploit designed to execute without user int… https://t.co/Pjz5WTbg8d https://twitter.com/i/web/status/1571666655780179968DannyCybersec
2022-09-16 13:01:21Tracked as CVE-2022-30190, Follina is a Microsoft Office zero-day vulnerability that has recently been added to the… https://t.co/qVSL85tAoO https://twitter.com/i/web/status/1570751872272564224CswWorks
2022-09-16 06:41:26🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2022-30190: https://t.co/2MG0N5KBHu https://t.co/uxyJwQ7DnI https://github.com/winstxnhdw/CVE-2022-30190Prohacktiv3
2022-09-15 13:23:33@StopMalvertisin Seems like using CVE-2022-30190. But can't download payload from C2Computeus7
2022-09-15 13:22:36@Computeus7 They are not using CVE-2022-30190 https://t.co/g3lbWLJ2xnStopMalvertisin
2022-09-09 13:50:42"Guidance_for_CVE-2022-30190_Microsoft_Support_Diagnostic_Tool_Vulnerability.pdf.exe": f802a5c5fe73a7783079ead2b1f5… https://t.co/Qy9hUfAR9w https://twitter.com/i/web/status/1568234242856845313malwrhunterteam
2022-09-07 06:30:29Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 https://t.co/tIps5TNhDN https://cymulate.com/blog/cve-2022-30190-2/reverseame
2022-09-06 14:20:49#CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files https://t.co/GHJZZKMBUW https://cymulate.com/blog/cve-2022-30190/WilfridBlanc
2022-09-06 03:40:09CVE-2022-30190 - Cymulate https://t.co/EnaPlVQcTH https://cymulate.com/blog/cve-2022-30190/NeobeePaul
2022-09-06 03:10:05CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files #Cybersecurity #security via… https://t.co/ghKYJlqi7Q https://twitter.com/i/web/status/1566986581675855872MnkeniFrancis
2022-09-05 21:50:06@SwiftOnSecurity @arekfurt The whole reason Follina CVE-2022-30190 was possible was that Office (and PowerShell's I… https://t.co/on8LynxZNq https://twitter.com/i/web/status/1566904128709738496wdormann
2022-09-05 18:11:58CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files https://t.co/BvADnP6Txf https://cymulate.com/blog/cve-2022-30190/AlexaChenowith
2022-09-05 13:12:10Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 107.6K (audience size) CVE-2022-36076: 94.9K CVE-2022-… https://t.co/gFrznxaz8f https://twitter.com/i/web/status/1566773152809615363CVEtrends
2022-09-05 09:40:56CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files https://t.co/dbKNON9qB6 https://bit.ly/3RkP9iw0SS4M4
2022-09-05 09:01:00CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files via /r/netsec https://t.co/65OqMRfhPb #cybersecurity #netsec #news https://ift.tt/8kjQ7xUCybrXx0
2022-09-05 08:50:29New post: "CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files" https://t.co/myrZEbqndE https://ift.tt/MsASQJiMyinfosecfeed
2022-09-05 08:30:48CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files https://t.co/SBR4CxXEMv https://cymulate.com/blog/cve-2022-30190/_r_netsec
2022-09-02 13:13:04Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 396.7K (audience size) CVE-2022-2294: 232.7K CVE-2022-… https://t.co/0piCvi91Ed https://twitter.com/i/web/status/1565685987769974787CVEtrends
2022-09-02 11:30:06@StopMalvertisin @1ZRR4H @luigi_martire94 @malwrhunterteam mentioned Follina CVE-2022-30190 Samples Docx… https://t.co/1VFLp0dPe4 https://twitter.com/i/web/status/1565661960280150016JAMESWT_MHT
2022-09-02 05:20:28#Follina CVE-2022-30190 223341099.docx https://t.co/GkmoqSSRJZ https://qaz[.]im/load/diy5AH/b6d42680-56fd-4f98-ae0… https://t.co/tNs3pYjYib https://www.virustotal.com/gui/file/3833142e8b5a9174615c83c1165fa67bd9f46a230058adf8fc9cbb081bb92d30 https://twitter.com/i/web/status/1565568583597686784StopMalvertisin
2022-08-31 07:00:25Bei #Sicherheitslücken muss schnell reagiert werden - wie bei CVE-2022-30190. Was wir getan haben? Ein… https://t.co/J19dChJggW https://twitter.com/i/web/status/1564870599910084608novaCapta
2022-08-29 23:42:36Detect the Follina MSDT Vulnerability (CVE-2022-30190) with Qualys Multi-Vector EDR & Context XDR | Qualys Security… https://t.co/acEOCgFI9f https://twitter.com/i/web/status/1564394575682310146JonathanJBailey
2022-08-28 21:50:15Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT https://t.co/8HUFy3vYa2 https://blogs.quickheal.com/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt/nurulalam37055
2022-08-27 13:15:08Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-36804: 1.5M (audience size) CVE-2022-30190: 184.1K CVE-2022-2… https://t.co/ZbEFKx5n0f https://twitter.com/i/web/status/1563511660031012864CVEtrends
2022-08-27 10:30:11Threat Research New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)… https://t.co/XvkGKGwbVq https://twitter.com/i/web/status/1563472869715103745doukkalli
2022-08-26 23:12:17#Follina CVE-2022-30190 westele.docx Submitted from UA 812f20d2efdf9807d425cb63ea737d4bbc4774af375dbc6d3164b913c450… https://t.co/NC7m6phKjD https://twitter.com/i/web/status/1563302303855423489StopMalvertisin
2022-08-23 13:00:15News: Microsoft ‘Follina’ RCE Vulnerability (CVE-2022-30190) https://t.co/EfjIebJjJN https://dorning-cyber.com/general/news-microsoft-follina-rce-vulnerability-cve-2022-30190DorningCyber
2022-08-21 22:20:04Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT https://t.co/p1LvJNtx9e https://buff.ly/3R9Io3mLeoSimmeren
2022-08-18 13:00:17🟠Investigadores de @virustotal han buscado muestras que explotaran la #vulnerabilidad CVE-2022-30190 (#Follina) y h… https://t.co/efvLXBVdEB https://twitter.com/i/web/status/1560249662723997697QintegraC
2022-08-18 09:23:45https://t.co/0n7ZItQWU1 CVE-2022-30190 (aka Follina) is a 0-day vulnerability that was disclosed on Twitter last Ma… https://t.co/lV0eiJzvEB https://blog.virustotal.com/2022/08/hunting-follina.html https://twitter.com/i/web/status/1560193103109230593MirchaEmanuel
2022-08-17 23:50:22Good write up on CVE-2022-30190 ("Follina"): https://t.co/KYRz5pNnaM https://blog.virustotal.com/2022/08/hunting-follina.htmllguelorget
2022-08-17 19:30:42We hunted for samples exploiting CVE-2022-30190 (aka Follina) vulnerability. Here is what we learnt along with ide… https://t.co/A38hSXnHJk https://twitter.com/i/web/status/1559985896044249088virustotal
2022-08-16 00:51:42Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT https://t.co/aKGarVtm3z https://buff.ly/3R9Io3mJonathanKeiler
2022-08-12 17:40:21Threat Hunting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit https://t.co/mYGkh8PHo3 #bugbounty,… https://t.co/3bhxrzhsYY https://ift.tt/1RDdEKb https://twitter.com/i/web/status/1558144625604530179Securitytemple
2022-08-12 09:00:22🤔eaf38b44489c77ff61b382162bd1ecc41682a1a5821c93a104b116e00ae7b5c4 Tagged as #Follina CVE-2022-30190 but I don't see… https://t.co/b8dH2E5BTw https://twitter.com/i/web/status/1558014327550263296StopMalvertisin
2022-08-12 03:24:40Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 https://t.co/i2A9DnHFV3 https://www.reddit.com/r/netsec/comments/vispu6/understanding_the_compound_file_binary_format_and/?utm_source=dlvr.it&utm_medium=twittertechadversary
2022-08-12 01:00:19https://t.co/c5jbvilWub Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit #cybersecurity https://securityboulevard.com/2022/08/detecting-follina-cve-2022-30190-microsoft-office-zero-day-exploit/netsecu
2022-08-12 00:31:01Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit: Follina (CVE-2022-30190) is a Microsoft Offi… https://t.co/IqD2akmHe8 https://twitter.com/i/web/status/1557882826871123968cipherstorm
2022-08-12 00:22:52Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit https://t.co/HX3y7HEszH https://securityboulevard.com/2022/08/detecting-follina-cve-2022-30190-microsoft-office-zero-day-exploit/security_inside
2022-08-11 21:40:16Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit https://t.co/PYvdaEl7eb https://bit.ly/3JVAU0Ypigram86
2022-08-11 08:21:42Add download_file_types.asciipb entry for DIAGCAB By now Microsoft has fixed both Follina CVE-2022-30190 and Dogwa… https://t.co/yRLgc0BvGT https://twitter.com/i/web/status/1557640582029246464hack_git
2022-08-10 15:00:20CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild https://t.co/X5CyrW6J0d https://buff.ly/3yCivSErgaski
2022-08-10 13:50:12Remember Follina, the MSDT issue that rolled onstage in late May? Turns out that vulnerability (CVE-2022-30190) has… https://t.co/oze49eQECG https://twitter.com/i/web/status/1557363299431419906SophosXOps
2022-08-10 13:01:05By now Microsoft has fixed both Follina CVE-2022-30190 and Dogwalk CVE-2022-34713 programming flaws. But please don… https://t.co/d1B0pPxMFu https://twitter.com/i/web/status/1557348886615826433wdormann
2022-08-09 12:30:56If youre interested in looking into the exploit to better educate yourself, its CVE-2022-30190, uses the MSDT proto… https://t.co/376eGsdXpI https://twitter.com/i/web/status/1556980641899909120MrTeaThyme
2022-08-08 13:20:05Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/pQrRnndjtT https://twitter.com/i/web/status/1556629492348686337ThibautBethon
2022-08-06 18:32:27All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools… https://t.co/5pCXtuFrD2 https://twitter.com/i/web/status/1555983279941210113doukkalli
2022-08-06 07:51:17All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools… https://t.co/6k7abrftIc https://twitter.com/i/web/status/1555821085513457664gaetanoz
2022-08-06 07:20:12follina (POC) All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Di… https://t.co/2LZeg6tQ3g https://twitter.com/i/web/status/1555813598529695744hack_git
2022-08-06 03:51:06Got my first bounty for Reddit by uploading CVE-2022-30190 Follina 🤣 on @Hacker0x01 #BugBounty… https://t.co/ATJyG1Qwxb https://twitter.com/i/web/status/1555762797820223490heckintosh_
2022-08-05 13:00:25#Follina CVE-2022-30190 novi fakturi.docx https://t.co/4JNihipS8A https://a.pomf[.]cat/hqrdkm.html… https://t.co/lJO2AvOCjT https://www.virustotal.com/gui/file/a386039e7e7a1f39a353173ef61960458da4a289047122d05f65e03c06d18ead https://twitter.com/i/web/status/1555536709286510592StopMalvertisin
2022-08-04 09:40:14@StopMalvertisin @malwrhunterteam @1ZRR4H @luigi_martire94 mentioned #Follina CVE-2022-30190 🔆… https://t.co/zR9lJJnv4S https://twitter.com/i/web/status/1555124010215739393JAMESWT_MHT
2022-08-04 06:30:17#Follina CVE-2022-30190 齐治堡垒机操作手册_20220622130730.docx a3379bc72e582722caa3706f48668cbe 通达OA工作流模块常见问题解答_2022062213… https://t.co/mNCG8rmGs5 https://twitter.com/i/web/status/1555076748521668613StopMalvertisin
2022-08-03 19:10:09.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/BS0sahHcq1 https://twitter.com/i/web/status/1554906241784315907FortiJames
2022-08-02 09:20:08Follina exploit (CVE-2022-30190) fuels "live-off-the-land" attacks https://t.co/CYdrQTSzeJ ReversingLabs Threat a… https://t.co/INzkCQFSqw https://blog.reversinglabs.com/blog/threat-analysis-follina-exploit-powers-live-off-the-land-attacks https://twitter.com/i/web/status/1554394993493774337PentestingN
2022-08-01 17:00:41How is #follina CVE-2022-30190 still in the wild? It's been weeks now and 4nmn(.)com is still live. Now they're p… https://t.co/guG1zeeCwr https://twitter.com/i/web/status/15541481569249566742600Hz_
2022-08-01 13:11:02Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 273.9K (audience size) CVE-2022-22819: 240.4K CVE-2022… https://t.co/svaCwwlQ73 https://twitter.com/i/web/status/1554089578797080576CVEtrends
2022-08-01 08:50:04@StopMalvertisin @malwrhunterteam @1ZRR4H @luigi_martire94 Mentioned #Follina CVE-2022-30190 samples Uploaded ➡️… https://t.co/biu7Z1xYlw https://twitter.com/i/web/status/1554026617927778305JAMESWT_MHT
2022-08-01 05:10:04#Follina CVE-2022-30190 order.docx https://t.co/nBMIUn6VHE http://polpharmar[.]com/test.html… https://t.co/jNXUr8XrC7 https://www.virustotal.com/gui/file/aa26ed65b5b05b28fa8c56df8c0d87e6bfd8b98f962824293acce14d03cd3412 https://twitter.com/i/web/status/1553970459712319488StopMalvertisin
2022-07-27 17:50:49#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/9QwcizrW7T https://twitter.com/i/web/status/1552349354178088963MattHamlin12
2022-07-27 13:11:34Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-26712: 368.8K (audience size) CVE-2022-30190: 205.1K CVE-2022… https://t.co/abwWNpKmnP https://twitter.com/i/web/status/1552277637116084225CVEtrends
2022-07-27 06:50:09#Follina CVE-2022-30190 DHL EXPRESS AWB 3637450703.docx https://t.co/6hlTc3X8lN http://154.127.53[.]242/document/dh… https://t.co/kavBknbjIX https://www.virustotal.com/gui/file/001b51f7860f6c8fb7a68996c611cf7e0e39e39d0d355a2837b62d32620d670b https://twitter.com/i/web/status/1552183767925936129StopMalvertisin
2022-07-26 08:20:11@RealTryHackMe room Follina MSDT: A walkthrough on the CVE-2022-30190, the MSDT service, exploitation of the servic… https://t.co/9KozdckRCL https://twitter.com/i/web/status/1551843119066488832DjalilAyed
2022-07-26 00:20:48#Follina CVE-2022-30190 RTF: https://t.co/uIlVj5IuZ5 http://106.15.186[.165/MSTDx86.html - Connection time out Seve… https://t.co/vLsGwp9tyR https://www.virustotal.com/gui/file/ba94df13da1d629210836586fc32bcc0aefd077dd001661d396d08b5b796f8cd https://twitter.com/i/web/status/1551723838844850177StopMalvertisin
2022-07-25 23:30:42@malwrhunterteam Thank you :) #Follina CVE-2022-30190 https://akmalreload[.]com/struk/wellcome.html https://akmalre… https://t.co/y9iCpNtGPx https://twitter.com/i/web/status/1551709585047957504StopMalvertisin
2022-07-25 15:12:59#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/BowNDRK2Q3 https://twitter.com/i/web/status/1551583072604360704netx_info_sys
2022-07-23 00:20:33CVE-2022-30190 : Microsoft Windows Support Diagnostic Tool RCE https://t.co/32utYxvTOM https://t.co/XRM6dpUFCj https://www.reddit.com/r/netsec/comments/v3ojgg/cve202230190_microsoft_windows_support_diagnostic/?utm_source=dlvr.it&utm_medium=twittertechadversary
2022-07-21 20:52:41#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/aoqwBSXeKJ https://twitter.com/i/web/status/1550220326201692160NetsyncNews
2022-07-21 20:52:26#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/aIRVYw3Ev1 https://twitter.com/i/web/status/1550220329469067268NetsyncNewsMEA
2022-07-20 22:21:38Windows の脆弱性 Follina CVE-2022-30190 を悪用する Rozena バックドアに注意! #security #follina #vulnerability #backdoor https://t.co/Uihg6MnpFt http://iototsecnews.jp/2022/07/09/hackers-exploiting-follina-bug-to-deploy-rozena-backdoor/iototsecnews
2022-07-20 10:50:04Analizando y explotando FOLLINA MSDT ( CVE-2022-30190 ) Vulnerabilidad en Windows que a través de un documento expl… https://t.co/vpjJQXkX80 https://twitter.com/i/web/status/1549708164823748608hackersumh
2022-07-20 09:30:09#Turla #Ghostwriter #COLDRIVER opreation CVE-2022-30190 https://t.co/vpMxgVJmr4 https://t.co/WuBSUstMHM https://blog.google/threat-analysis-group/continued-cyber-activity-in-eastern-europe-observed-by-tag/blackorbird
2022-07-20 06:10:55#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/svD7PkDxry https://twitter.com/i/web/status/1549635220621692929Raabtah1
2022-07-19 14:00:13#Follina CVE-2022-30190 https://t.co/Vs8bLNrVP1 URL: http://185.104.114[.]24/1.html Payload: http://185.104.114[.]2… https://t.co/2FSZLV6Zl0 https://www.virustotal.com/gui/file/fee26f4d6e19b7e7f488a19e44e7576fce3fbbe5d4c550126083d67c377896dd https://twitter.com/i/web/status/1549392241935933440StopMalvertisin
2022-07-19 05:00:25.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/7BrghuEiB0 https://twitter.com/i/web/status/1549255386544455680lynettejdsouza
2022-07-19 01:10:15【ブログ更新】2022年6月のバグレポートでは、CVE-2022-26134, CVE-2022-30190,CVE-2022-22980 を取りあげます。毎月恒例のこの記事では、当社のセキュリティ・リサーチャーが脆弱性、パッチ、… https://t.co/GX2agN9xdi https://twitter.com/i/web/status/1549197331207262209Trellix_JP
2022-07-19 00:52:11FortiGuardLabsInforme de señal de amenaza: Follina: Vulnerabilidad MSDT de Windows de 0 días (CVE-2022-30190) explo… https://t.co/fDmFm6DJvC https://twitter.com/i/web/status/1549193562625134596securebyte
2022-07-18 15:00:29#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/TE4lg6f08C https://twitter.com/i/web/status/1549046340201590790ChickasawTel
2022-07-18 10:00:31Keysight’s Take on CVE-2022-30190 MSDT Follina Exploit. https://t.co/r1655izRod #NetworkSecurity #CyberSecurity https://t.co/ZUbjJjdwFF http://ow.ly/Mpiz50JOxBzKeysight_UK
2022-07-18 08:20:38Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/yYaCbo4fvE https://twitter.com/i/web/status/1548944417989529600OberbergOnline
2022-07-18 07:40:12.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/L4sS5Noap3 https://twitter.com/i/web/status/1548933518406860800ChrisRobertsSec
2022-07-17 07:11:07.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/Qk6LF1oBzf https://twitter.com/i/web/status/1548564678992953345mo_helal
2022-07-16 13:11:22Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-33980: 144.8K (audience size) CVE-2022-30190: 132.6K CVE-2022… https://t.co/vmWU5gMd54 https://twitter.com/i/web/status/1548291370661470216CVEtrends
2022-07-15 20:06:27Analytics Top 10 Most Used Vulns of the Month (June 1-30) CVE-2022-30190 - Follina exploit CVE-2022-26134 - OGNL… https://t.co/ve0wbGwRHr https://twitter.com/i/web/status/1548032783670358016doukkalli
2022-07-15 18:31:12CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-07-15 17:50:05#Follina CVE-2022-30190 Exploit Generator for skids ... b2743f7047a7119794a28840403def40e27ff7f9575ef060c458ab4fe3e… https://t.co/vDmB3ZPvdz https://twitter.com/i/web/status/1548001843309346816StopMalvertisin
2022-07-15 15:14:30CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-07-15 14:40:29.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded o… https://t.co/N2gWGKlleQ https://twitter.com/i/web/status/1547950413483151366FortiJames
2022-07-15 14:11:56#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/U3OWY9jtSi https://twitter.com/i/web/status/1547944078867779584ConnexionStrong
2022-07-15 14:02:03#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/4ULX7Cj2rH https://twitter.com/i/web/status/1547942251078119427KadimaConsult
2022-07-15 14:01:31#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/gRSPnicr2S https://twitter.com/i/web/status/1547942255024959489MarcFarron
2022-07-15 13:00:51.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/fePbzvqqOi https://twitter.com/i/web/status/1547928302488207368DaveMcKay
2022-07-15 00:50:58#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/jacx4XnJtO https://twitter.com/i/web/status/1547743754366304258EBSolutionCA
2022-07-15 00:50:11#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/xUPKcBnArn https://twitter.com/i/web/status/1547745013148164099itblueprint
2022-07-15 00:40:35#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/WP68GtLjUh https://twitter.com/i/web/status/1547741238039760897jdpatfield
2022-07-14 23:40:29#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/9vEr2Sx1k9 https://twitter.com/i/web/status/1547726641941450752itblueprint
2022-07-14 23:14:57#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/xZoqq3vOPc https://twitter.com/i/web/status/1547717586741104641Regem_ITS
2022-07-14 23:01:11#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/DPDvmCxwQg https://twitter.com/i/web/status/1547716577033785345ICT_NETWORK_SYS
2022-07-14 22:32:06#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/6jlIO691lI https://twitter.com/i/web/status/1547707768005545989Gl7Grupo
2022-07-14 22:31:01#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/Oz8EJt61Om https://twitter.com/i/web/status/1547709278416302082hytekcomputers
2022-07-14 22:20:39#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/n4HgbEcTRb https://twitter.com/i/web/status/1547706763058614273hutton647
2022-07-14 22:13:53#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/zUzpjmNsDn https://twitter.com/i/web/status/1547702987316809728TalleyBilly
2022-07-14 22:13:38#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/RC3XPopQAM https://twitter.com/i/web/status/1547703741352095747CyberSecManaged
2022-07-14 22:11:31#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/jAPCOKInDH https://twitter.com/i/web/status/1547704748404445184ArrakisConsult
2022-07-14 22:11:19#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/Y3WSOQRat5 https://twitter.com/i/web/status/1547704752850341890OmniBSolutions
2022-07-14 22:11:03#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/2pLuNj4eyb https://twitter.com/i/web/status/1547704758491746304Edge_worx
2022-07-14 22:01:46#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/12lZb5ZMOb https://twitter.com/i/web/status/1547700972746469385NorcomSolutions
2022-07-14 22:01:07#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/almpdkR9kH https://twitter.com/i/web/status/1547701223888801792fuselogix
2022-07-14 22:00:56#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/AUtFQ1Mxlq https://twitter.com/i/web/status/1547701746922770433o_integradas
2022-07-14 22:00:29#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/4KJVlRdrck https://twitter.com/i/web/status/1547702231444516864Fzimmerb
2022-07-14 21:52:24#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/rUhAy1ISn5 https://twitter.com/i/web/status/1547697953166409730smbgurus
2022-07-14 21:41:07#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/RQVAMXlBdh https://twitter.com/i/web/status/1547695435849994240systems_managed
2022-07-14 21:40:38#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/OB8qiZhBVp https://twitter.com/i/web/status/1547696442126479361kgalus
2022-07-14 21:31:22#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/wH6E4H99R7 https://twitter.com/i/web/status/1547692667902906375jesuscajero
2022-07-14 21:20:22#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/67MFScQlje https://twitter.com/i/web/status/1547690653349359624CanteraIT
2022-07-14 21:20:12#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/y84suWO1YM https://twitter.com/i/web/status/1547691168242081799InfoSecAcumen
2022-07-14 21:20:07#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/YJ0QgZ71MS https://twitter.com/i/web/status/1547692164318015494mgari78
2022-07-14 21:10:12#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/9htmtCo3Px https://twitter.com/i/web/status/1547688900881047553squaremoat
2022-07-14 21:10:05#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/EeriEgLEPD https://twitter.com/i/web/status/1547689648314454016smbgurus
2022-07-14 21:00:39#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/NdXfNrV2Jq https://twitter.com/i/web/status/1547682602139545601jorpnes
2022-07-14 21:00:16#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/9Ql9ei3Tll https://twitter.com/i/web/status/1547683356715786243barryfein
2022-07-14 21:00:11#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/pa3QFYcI9Q https://twitter.com/i/web/status/1547685118428385283Innov8tv
2022-07-14 20:52:37#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/88Fn55hrO1 https://twitter.com/i/web/status/1547683860346875904SydowIS
2022-07-14 20:41:42#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/xy1sVU3Dvg https://twitter.com/i/web/status/1547681342736936962bbserviceskv
2022-07-14 20:41:07#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/anwLbXBWqk https://twitter.com/i/web/status/1547681594747396103e_computech
2022-07-14 20:37:00#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/0yNf1wurr3 https://twitter.com/i/web/status/1547677333393264641SeamlessAdvSolu
2022-07-14 20:36:29#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/5dSUGJnzl6 https://twitter.com/i/web/status/1547677820674920449stigroup
2022-07-14 20:35:58#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/zXklRIlhn2 https://twitter.com/i/web/status/1547677824600879108elev8tech
2022-07-14 20:32:58#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/nIVOCdPUqp https://twitter.com/i/web/status/1547679330712502272MarcioLoboM1
2022-07-14 20:20:58#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/O1vkgmqimI https://twitter.com/i/web/status/1547675051951923202khronostelecom
2022-07-14 20:02:41#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/0R4lcR99Xb https://twitter.com/i/web/status/1547670270202093570LynexServices
2022-07-14 20:01:54#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/hZkbHLs4pI https://twitter.com/i/web/status/1547671026380681216Boylesinfosys
2022-07-14 20:00:44#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/BAda8oIy9t https://twitter.com/i/web/status/1547671529403473924somosintegratec
2022-07-14 19:54:06#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/CxuvAJ9tVi https://twitter.com/i/web/status/1547667753791676416ratech_services
2022-07-14 19:42:24#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/pJdN3TywKn https://twitter.com/i/web/status/1547665489165291524BornConsultants
2022-07-14 19:40:19#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/g2b8JluJvz https://twitter.com/i/web/status/1547666495353761792TisecI
2022-07-14 19:33:20#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/EgOmEAA6MT https://twitter.com/i/web/status/1547662468830310406NowTechSolution
2022-07-14 19:32:44#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/VyoI0zCDi8 https://twitter.com/i/web/status/1547662721377701888SecureERP
2022-07-14 19:30:58#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/tWE4Thid0a https://twitter.com/i/web/status/1547664482473611267securityinfras
2022-07-14 19:20:34#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/boYoSdw0vW https://twitter.com/i/web/status/1547661211382059008FortiOne_IT
2022-07-14 19:11:49#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/BVU4IIuoBk https://twitter.com/i/web/status/1547657939170643969SecurityVal
2022-07-14 19:10:58#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/eJlYIOIiqn https://twitter.com/i/web/status/1547659449715662850gatanasio_71
2022-07-14 19:10:17#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/cEzZe7cVIn https://twitter.com/i/web/status/1547659701101285377trinitynetworx
2022-07-14 19:02:35#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/6J5r7RrFrA https://twitter.com/i/web/status/15476546709312675841Opsec2
2022-07-14 19:01:53#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/RP9Qd5G9D2 https://twitter.com/i/web/status/1547654919204638722amsinetworks
2022-07-14 18:53:37#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/XtFqJjahVH https://twitter.com/i/web/status/1547653411662729217carloyolax
2022-07-14 18:50:49#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/xrof8MKDpd https://twitter.com/i/web/status/1547653913133821954Michael_StJohn
2022-07-14 18:50:11#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/gltGUm7QYR https://twitter.com/i/web/status/1547654667332513795SphereIS360
2022-07-14 18:41:41#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/Uvzd053AiT https://twitter.com/i/web/status/1547649939047469057ICSGetsIT
2022-07-14 17:47:32#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/SPtxNwYDs1 https://twitter.com/i/web/status/1547634787073998849SolventTechGh
2022-07-14 17:46:20#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/qyzffm1HoD https://twitter.com/i/web/status/1547635042083409921andmacsil
2022-07-14 16:41:09#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/ZVTrDONS77 https://twitter.com/i/web/status/1547621197554130948actisoft_tech
2022-07-14 16:12:43#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/HwkRFoiWsM https://twitter.com/i/web/status/1547613396673040388TechExDigitals
2022-07-14 16:00:17#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/TxFYP5opAA https://twitter.com/i/web/status/1547610885341925376TechproGlobalGH
2022-07-14 15:53:34#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/pXW0O5DH71 https://twitter.com/i/web/status/1547607608621555713stinnerIT
2022-07-14 15:13:00CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-07-14 14:40:21#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/auOE2OGoux https://twitter.com/i/web/status/1547589240812277762MicheleCiacci
2022-07-14 14:32:17#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/rvfbtqBoWA https://twitter.com/i/web/status/1547589245363073024OptimisingIT
2022-07-14 14:25:06#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/Kz3cq5IUBv https://twitter.com/i/web/status/1547584959480598532albirony1
2022-07-14 14:22:41#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/zxcsZ7csvt https://twitter.com/i/web/status/1547585466475503619Acenetworkscy
2022-07-14 14:11:11#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/C66zUrhFQd https://twitter.com/i/web/status/1547582947502370817CarerraHoldings
2022-07-14 13:53:01#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/VPwBqHOaYV https://twitter.com/i/web/status/1547577914845122568AVFZC
2022-07-14 13:27:29#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/IU1eRNu1j0 https://twitter.com/i/web/status/1547569612597825536agrisols
2022-07-14 12:40:22#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/Aq8Iq4vTU4 https://twitter.com/i/web/status/1547560799991803904FrikEnTwit
2022-07-14 11:50:20#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/fTqu60vSgo https://twitter.com/i/web/status/1547548467177865217ConceptCareTech
2022-07-14 11:40:36#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/JlxRqCilyj https://twitter.com/i/web/status/1547544943975088129nimedeux
2022-07-14 11:30:50#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/uwUjWPvepQ https://twitter.com/i/web/status/1547543687688863744LtdNamaste
2022-07-14 10:50:20#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/JT8tjHyYno https://twitter.com/i/web/status/1547532503027793921ShahsiRathnayak
2022-07-14 10:50:11#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/OaTCGUeQLM https://twitter.com/i/web/status/1547532628655497217ibseleven
2022-07-14 10:14:21#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/HbasvEPakn https://twitter.com/i/web/status/1547521299769135104digitrackspl
2022-07-14 09:31:01#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/cbiOCm2sQ9 https://twitter.com/i/web/status/1547512983219490817INStream10
2022-07-14 09:20:26#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/0Uh0fJ0HM1 https://twitter.com/i/web/status/1547510976567803904FnCybersecurity
2022-07-14 09:17:23#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/vgXv2FAEe5 https://twitter.com/i/web/status/1547507446779985921TechnologiesZm
2022-07-14 09:16:34#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/rzpM9aI9ee https://twitter.com/i/web/status/1547508202132176897IntriousTech
2022-07-14 08:48:12#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/s1BNrni46z https://twitter.com/i/web/status/1547498642805776384everbextec
2022-07-14 08:31:59#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/VKbXmlZuJP https://twitter.com/i/web/status/1547497891475898368MYBintara
2022-07-14 06:30:48#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/frLyFY75R4 https://twitter.com/i/web/status/1547466930721886208shanil_daya
2022-07-14 05:40:08#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/gqmA0zeeK6 https://twitter.com/i/web/status/1547455354442633216MBITJapan
2022-07-14 04:50:34#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/cq29Cp13tO https://twitter.com/i/web/status/1547442267237007360Trust3Security
2022-07-14 03:20:11【ブログ更新】Trellixは、"Follina "と呼ばれるMicrosoft Officeのゼロデイ脆弱性 (CVE-2022-30190)に関する脅威活動を継続的に監視しています。国家の関与が疑われるアクターが、このゼロデイ… https://t.co/xPuGCFOKVe https://twitter.com/i/web/status/1547415596240871425Trellix_JP
2022-07-13 23:08:16.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/Afc4Sai5xs https://twitter.com/i/web/status/1547353635046260737W_Gartner
2022-07-13 21:16:44.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/f9HffOrIB9 https://twitter.com/i/web/status/1547325127171493889SDCarter10
2022-07-13 18:20:10.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded o… https://t.co/PpZOxhsvxr https://twitter.com/i/web/status/1547283508825100289k3ym0
2022-07-13 15:20:08@CatoNetworks Protects Against Microsoft Office Follina Exploits In May, Microsoft issued CVE-2022-30190 Cato’s… https://t.co/8qVyRtDIsk https://twitter.com/i/web/status/1547237458928173056ignition_tech
2022-07-13 14:30:41Mitigate ‘Follina’ Office Zero-Day Vulnerability CVE-2022-30190 https://t.co/Z4jRVJFoZi https://t.co/PHDY4WOxsl https://ift.tt/nB3kExN https://ift.tt/y6viGmHbuaqbot
2022-07-13 13:10:31.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/4FUGjUByZ7 https://twitter.com/i/web/status/1547204371284467714kingburnie
2022-07-13 10:20:11#CVE-2022-30190 From https://t.co/3IlY8Uq3m2 H/T @malwrhunterteam > #ShikataGaNai #Rozena From… https://t.co/WoMfpq7DMP https://urlhaus.abuse.ch/url/2256955/ https://twitter.com/i/web/status/1547162597056815104JAMESWT_MHT
2022-07-13 06:52:13#Qakbot Infection #CVE-2022-30190 #Follina 🚨 #MalDoc name pattern: doc[0-9]{3}\.docx More payloads:… https://t.co/sRoAqtVd3K https://twitter.com/i/web/status/15471086793878405123XS0
2022-07-13 05:20:22.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/WWQj92KHVf https://twitter.com/i/web/status/1547088034574864384JOSEGMM
2022-07-12 22:12:18#CVE-2022-30190 https://t.co/a6dtYiZuPB https://twitter.com/virusbtn/status/1544998912972402688MalHunters
2022-07-12 21:22:35.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/ZUGo1Faskh https://twitter.com/i/web/status/1546963538803130368Vderstraeten
2022-07-12 20:21:17.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (Follina) to trigger the download of t… https://t.co/TiALNWBjhi https://twitter.com/i/web/status/1546951870370963457andrez747
2022-07-12 03:50:04Day 47-52 of #100DaysOfHacking Learned Follina MSDT Vulnerability CVE-2022-30190 - Malicious Word document to RCE… https://t.co/BgzHLkcYbU https://twitter.com/i/web/status/1546703334266249217imfaiqu3
2022-07-12 01:10:25🧐 "Attempt" (emphasis on Attempt) to exploit #Follina CVE-2022-30190 in an Excel (.xlsx) file. In file: _rels/.rels… https://t.co/MqipGt0k6n https://twitter.com/i/web/status/15466616620143165453XS0
2022-07-11 13:11:09Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 297.6K (audience size) CVE-2022-2368: 127.9K CVE-2022-… https://t.co/5weMa1WcNL https://twitter.com/i/web/status/1546479432013070343CVEtrends
2022-07-11 11:50:08[ALERT] Be careful of a new malware #Rozena that exploits CVE-2022-30190 #Follina to trigger back a remote shell co… https://t.co/kcugANHLKj https://twitter.com/i/web/status/1546461194000781312vFeed_IO
2022-07-11 11:50:06[ALERT] Be careful of a new malware #Rozena that exploits CVE-2022-30190 #Follina to trigger back a remote shell co… https://t.co/5Hl6dWDd1b https://twitter.com/i/web/status/1546461277769318401ToolsWatch
2022-07-10 21:10:04Apparently this is the very first sample (#Follina) found in the wild. (CVE-2022-30190). It ended up in InQuest Lab… https://t.co/xiKP7XopID https://twitter.com/i/web/status/1546238480447148033DmitriyMelikov
2022-07-09 20:20:08「Fortinet FortiGuard Labsの研究者は、最近公開されたFollinaセキュリティの脆弱性(CVE-2022-30190、CVSSスコア7.8)を利用してWindowsシステムにRozenaバックドアを配布する… https://t.co/QkTbWTBm45 https://twitter.com/i/web/status/1545863338764029953foxbook
2022-07-09 13:20:10CVE Series: Follina (CVE-2022-30190) | Cybrary https://t.co/QXgkNsRNCG https://www.cybrary.it/course/cve-series-follina-cve-2022-30190/PVynckier
2022-07-08 15:20:26.@FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded o… https://t.co/dPrTAAnEKN https://twitter.com/i/web/status/1545426505437691904kingburnie
2022-07-08 06:40:06@StopMalvertisin @malwrhunterteam @1ZRR4H @luigi_martire94 Mentioned #Follina #CVE-2022-30190 👇Sample👇 https://t.co/w4qSW1R7hl https://bazaar.abuse.ch/sample/6d4e5e60b4f6cbc8a6e14343b59c406fe5c7f948aded16d23a0f6ed6984907c2/JAMESWT_MHT
2022-07-08 02:30:13last month, many #APT groups used this code #Follina( CVE-2022-30190 )and RTF file in order to avoid the Microsoft… https://t.co/PHj48IHX0i https://twitter.com/i/web/status/1545233178440646656li_na_88
2022-07-08 02:12:44last month, many APT groups used this code Follina( CVE-2022-30190 )and RTF file in order to avoid the Microsoft Of… https://t.co/5i0pdv2xD4 https://twitter.com/i/web/status/1545226490891337728li_na_88
2022-07-07 22:23:51Analytics Top 10 Most Used Vulns of the Month (June 1-30) CVE-2022-30190 - Follina exploit CVE-2022-26134 - OGNL… https://t.co/PNyld89bFR https://twitter.com/i/web/status/1545170031029387268AlirezaGhahrood
2022-07-07 19:00:08#FortiGuardLabs recently discovered a document that exploits CVE-2022-30190 (#Follina) to trigger the downloaded of… https://t.co/NXNAv6tX4a https://twitter.com/i/web/status/1545120472232239119FortiGuardLabs
2022-07-07 18:00:26🧐 "Attempt" (emphasis on Attempt) to exploit #Follina CVE-2022-30190 in an Excel (.xlsx) file. In file: _rels/.rels… https://t.co/tq3KiwLqTJ https://twitter.com/i/web/status/1545103863090655232StopMalvertisin
2022-07-07 13:20:22@sccf_1 CVE-2022-30190 たしかにマクロではないから可能性残りますね。amidaku
2022-07-07 13:02:07.@FortiGuardLabs provides an analysis and assessment to date of CVE-2022-30190: MSDT RCE vulnerability “#Follina.”… https://t.co/r6monoxLqx https://twitter.com/i/web/status/1545028874660093953FortiJames
2022-07-07 12:31:20@amidaku MSDTの脆弱性が残ったまんまだと、(CVE-2022-30190)厳しいかも…ウチでちゃんと実証してはないのですがsccf_1
2022-07-07 04:20:29Trellix Global Defenders: Follina – Microsoft Officeの ゼロデイ脆弱性 (CVE-2022-30190) https://t.co/Nd4nfG4kpT https://blogs.mcafee.jp/follina-microsoft-office-zero-day-cve-2022-30190ohhara_shiojiri
2022-07-06 13:00:07Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/DVQzuP6TDh https://twitter.com/i/web/status/1544666357597437954FortiJames
2022-07-06 02:23:12Por exemplo, a vulnerabilidade do Windows recentemente descoberta, Follina (CVE-2022-30190), é uma variante da vuln… https://t.co/OZiu6nx4yF https://twitter.com/i/web/status/1544504426362191872OkamiMwaree
2022-07-05 14:41:11#Follina CVE-2022-30190 台灣立訊精密有限公司職務需求表_2022.docx -> Taiwan Luxshare Precision Co., Ltd. Job Request Form_2022.docx… https://t.co/HzD4qQjdH9 https://twitter.com/i/web/status/1544328595094786048StopMalvertisin
2022-07-04 14:21:31CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files https://t.co/EGckv3UZ3s https://digitalskeleton.com.ng/threads/cve-2022-30190-aka-follina-uses-macro-less-word-docs-to-drop-rce-files.33251/CEOofDSS
2022-07-02 13:11:22Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 442.8K (audience size) CVE-2022-32532: 416.5K CVE-2022… https://t.co/J8yq66MuL7 https://twitter.com/i/web/status/1543217940568350720CVEtrends
2022-07-02 03:20:19CVE-2022-30190 ("Folina") is considered a fixed variant of CVE-2021-40444 (2021 itw), Confluence's CVE-2022-26134 i… https://t.co/JHBgIn0rQ6 https://twitter.com/i/web/status/154307135700448461180vul
2022-07-01 16:50:38Not sure if it's useful to anyone, but I started poking at a minimal RTF to trigger Follina CVE-2022-30190 (and fri… https://t.co/OLdEiDlCk6 https://twitter.com/i/web/status/1542912147247833088wdormann
2022-07-01 15:40:06🚨 New course release! 🚨 Have you heard of the Follina exploit (CVE-2022-30190)? Take our course to gain the skil… https://t.co/XMZdZ7adXc https://twitter.com/i/web/status/1542895112635576320cybraryIT
2022-07-01 12:50:14CVE-2022-30190 aka Follina (zero-day vulnerability). U guys should be careful opening any word documents. Opening i… https://t.co/osRUmyvvN2 https://twitter.com/i/web/status/1542852978691809286AllanGelion
2022-06-30 17:20:07#SecurityNews #TRISW66 Follina (CVE-2022-30190) https://t.co/DXYSPLszNN https://t.co/kMhiPnBF5Q… https://t.co/JGvnTqStB1 https://lnkd.in/gkC6mjUp https://lnkd.in/g3yzUDWX https://twitter.com/i/web/status/1542557552440778752toperzak
2022-06-30 17:00:06#SecurityNews #TRISW66 Follina (CVE-2022-30190) https://t.co/DXYSPLszNN https://t.co/kMhiPnBF5Q… https://t.co/AdwvIuMhKf https://lnkd.in/gkC6mjUp https://lnkd.in/g3yzUDWX https://twitter.com/i/web/status/1542553011347632128toperzak
2022-06-30 14:10:34Here’s some great info on why CVE-2022-30190 “Follina” is so powerful, how it works, and Microsoft’s workaround. https://t.co/PhJSVcfBJp https://sprou.tt/1jsYAhyH6Ycmblucey
2022-06-30 13:50:05The #XFiles info-stealer #malware has added a delivery module that exploits CVE-2022-30190, aka #Follina, for dropp… https://t.co/po5CVQ7YJU https://twitter.com/i/web/status/1542505248144498694pk_sharma2019
2022-06-29 19:18:50#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/KWYnzeXliN https://twitter.com/i/web/status/1542221369034801157ScottMcRyan
2022-06-29 19:18:34#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/Ex06Vz12Ef https://twitter.com/i/web/status/1542221375066234882Montra_Tech
2022-06-29 18:41:10Late to the game, but #EKFiddle detection for CVE-2022-30190 (Follina) added. https://t.co/U67qZosp1e https://t.co/uc1QDylFSm https://github.com/malwareinfosec/EKFiddleEKFiddle
2022-06-29 15:30:34#Follina #CVE-2022-30190 #threathunting https://t.co/XPESmin5hM https://twitter.com/SumoLogic/status/1539695470615957504demon117
2022-06-29 15:00:15TA413-CN-APT MSDT protokolü CVE-2022-30190 Saldırgan daha sonra programları yükleyebilir, verileri görüntüleyebilir… https://t.co/Dk37SNoc8e https://twitter.com/i/web/status/1542160217605021698emrahsaridag1
2022-06-29 05:11:32MSDTの脆弱性(CVE-2022-30190、Follina)を悪用したWordファイルについて検証 | ScanNetSecurity https://t.co/wQEMEfJf8N https://scan.netsecurity.ne.jp/article/2022/06/29/47807.htmlohhara_shiojiri
2022-06-29 05:01:26#Follina CVE-2022-30190 THE FUTURE OF OCC MEETINGS IN 2022.docx https://t.co/kOjf2VWBOQ URL: https://consumerfinanc… https://t.co/xZFQDKGRQI https://www.virustotal.com/gui/file/e96e066197c5b3fd38e7a12318a232de2c8a703a0f419e0b7e30087f7525e530 https://twitter.com/i/web/status/1542008393921331200StopMalvertisin
2022-06-29 04:46:24#Follina CVE-2022-30190 Payment Notification.pdf.RTF https://t.co/cfOw1ifHdi Not your normal "default Apache2 welco… https://t.co/0tTKwx1jTO https://www.virustotal.com/gui/file/c437880e12e73b35345bf968c1c08b1efdd6e9f683a602596b8d5a7b74ad601b https://twitter.com/i/web/status/1542003541535248384StopMalvertisin
2022-06-29 00:40:25MSDTの脆弱性(CVE-2022-30190、Follina)を悪用したWordファイルについて検証 https://t.co/fmS4xAMeTo https://scan.netsecurity.ne.jp/article/2022/06/29/47807.htmlitit7777
2022-06-28 23:50:18エクスプローラーのプレビューだけでもPoCが成り立ったそうで:MSDTの脆弱性(CVE-2022-30190、Follina)を悪用したWordファイルについて検証 | ScanNetSecurity https://t.co/4DflPiyuYl https://itnews.org/news_resources/319256tamosan
2022-06-28 23:33:32MSDTの脆弱性(CVE-2022-30190、Follina)を悪用したWordファイルについて検証 https://t.co/ey0f8Dr7iZ https://t.co/RsAdE7l0ij http://izumino.jp/Security/sec_trend.cgi?ref=tw&ref_date=2022-06-29%2008%3A20 https://scan.netsecurity.ne.jp/article/2022/06/29/47807.htmlsec_trend
2022-06-28 23:21:54MSDTの脆弱性(CVE-2022-30190、Follina)を悪用したWordファイルについて検証 https://t.co/Ma7SAYM3Rl https://t.co/Z8xIp4ey37 http://dlvr.it/ST1QWYTokyoSec
2022-06-28 23:18:23MSDTの脆弱性(CVE-2022-30190、Follina)を悪用したWordファイルについて検証 https://t.co/IWdgSAm0Tk https://scan.netsecurity.ne.jp/article/2022/06/29/47807.htmlScanNetSecurity
2022-06-28 23:11:01MSDTの脆弱性(CVE-2022-30190、Follina)を悪用したWordファイルについて検証 https://t.co/7RtMgWIs9E https://ift.tt/Ug9fBmritsecalert
2022-06-28 14:45:27Documentos de MS Office como puerta de entrada: la nueva vulnerabilidad CVE-2022-30190, conocida como Follina, perm… https://t.co/4VPI8Mu4d5 https://twitter.com/i/web/status/1541792676722475009Arabsanet
2022-06-28 14:12:14Documentos de MS Office como puerta de entrada: la nueva vulnerabilidad CVE-2022-30190, conocida como Follina, perm… https://t.co/x69wV0WC6j https://twitter.com/i/web/status/1541783746126512128KasperskyLatino
2022-06-28 11:20:04Ma ma ma myyyy Follina [insert air guitar here]. CVE-2022-30190 - Ukraine caught a rat, DCRat that is. https://t.co/8UKV2THFlr https://www.fortinet.com/blog/threat-research/ukraine-targeted-by-dark-crystal-rat?lctg=141970837vidmooreda
2022-06-27 17:30:10CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina” | FortiGuard Labs… https://t.co/1GBATA8hXG https://twitter.com/i/web/status/1541473318863155200blueteamsec1
2022-06-27 11:20:39⚠️#Follina : des documents Office comme porte d’entrée. La nouvelle vulnérabilité CVE-2022-30190, alias #Follina, p… https://t.co/Qdbdh50nzJ https://twitter.com/i/web/status/1541375819037253632kasperskyfrance
2022-06-26 15:20:06#Обучение Новая уязвимость Windows для удалённого выполнения команд через документ.doc -CVE-2022-30190...… https://t.co/VKk6hHKBIV https://twitter.com/i/web/status/1541076860578168836IT_news_for_all
2022-06-26 03:30:06Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/P9XbvXKSWP https://twitter.com/i/web/status/1540898111312232449bhiggy12
2022-06-25 16:40:05بتازگی فایل وردی در حال انتشار است که ناقض #امنیت_سایبری و ناقل ضعف امنیتی CVE-2022-30190 معروف به Follina میباشد ک… https://t.co/X4jiDUgJM0 https://twitter.com/i/web/status/1540734776138600453HBojnordi
2022-06-24 19:43:56"Identified as CVE-2022-30190, the flaw makes it possible to modify Microsoft Office documents to bypass Protected… https://t.co/9YCnA2DTan https://twitter.com/i/web/status/1540418997367123968LaniDotTech
2022-06-24 18:31:57CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-24 18:10:45Como explorar o Follina CVE-2022-30190 https://t.co/V5KZQZmefZ #mindsec #minutodaseguranca #informationsecurity… https://t.co/jtiHzzbQl0 https://redirectlink.minutodaseguranca.blog.br/iae https://twitter.com/i/web/status/1540394391721938945MindSec_Brasil
2022-06-24 17:30:05Read the latest Cybrary Threat Intelligence Group (CTIG) coverage on #vulnerability CVE-2022-30190, also known as… https://t.co/DkZFkKT4Jn https://twitter.com/i/web/status/1540386776929501185cybraryIT
2022-06-24 15:11:21CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-24 12:40:40Anyone still having a working Windows Phone, care to scan this Follina/CVE-2022-30190 code and report what happens?VISSHAAAL
2022-06-24 05:40:34Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 https://t.co/58c8caKKO6 https://cymulate.com/blog/cve-2022-30190-2/MathWebEntry
2022-06-24 02:34:19Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 https://t.co/nO9uWJocyY https://cymulate.com/blog/cve-2022-30190-2/AlexaChenowith
2022-06-24 02:23:14Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 https://t.co/nO9uWJocyY https://cymulate.com/blog/cve-2022-30190-2/AlexaChenowith
2022-06-23 19:20:11We keep watching the CVE-2022-30190 (Follina) ! It got extended with hundreds of new IoVs (Indicators of Vulnerabil… https://t.co/lb9El422cC https://twitter.com/i/web/status/1540050989528584192vFeed_IO
2022-06-23 19:20:09We keep watching the CVE-2022-30190 (Follina) ! It got extended with hundreds of new IoVs (Indicators of Vulnerabil… https://t.co/6jm7LZEoTI https://twitter.com/i/web/status/1540051058252292096ToolsWatch
2022-06-23 17:51:02Microsoft Wordなどを介して任意コード実行が可能なMSDTの脆弱性(CVE-2022-30190、Follina)の検証 : NECセキュリティブログ | NEC https://t.co/rpnQrkdLie https://jpn.nec.com/cybersecurity/blog/220620/index.htmlSyaro_usagi
2022-06-23 16:11:16Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 - Cymulate https://t.co/Oth9W74Mxk https://cymulate.com/blog/cve-2022-30190-2/tais9
2022-06-23 15:11:01CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-23 15:00:12Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 https://t.co/XzBoUSzAXT https://cymulate.com/blog/cve-2022-30190-2/axcheron
2022-06-23 13:11:55Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 986.1K (audience size) CVE-2022-22980: 269.3K CVE-2022… https://t.co/qNJsG5mqWH https://twitter.com/i/web/status/1539956451531264000CVEtrends
2022-06-23 13:10:20Anyone still having a working Windows Phone, care to scan this Follina/CVE-2022-30190 code and report what happens? https://t.co/1ot9TWlZAcmkolsek
2022-06-23 10:00:39Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 via /r/netsec… https://t.co/XPSattISEV https://twitter.com/i/web/status/1539911093304295424CybrXx0
2022-06-23 09:51:33Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/tG0wNczUAx #cybersecurity #infosec #cyberwire http://CW.cyberwire.info/SShgTvCyberWire_
2022-06-23 09:32:06Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190 https://t.co/9QweMig8Dn https://cymulate.com/blog/cve-2022-30190-2/_r_netsec
2022-06-23 07:20:10#Follina CVE-2022-30190 Email Subject: SOLICITUD DE PRESUPUESTO https://t.co/ZSYGi3XfQp "CITA_393773979302827298923… https://t.co/QJhW5hjgJq https://www.virustotal.com/gui/file/520be9dab8572d781a783376b1c7353df1fb5ca5056fdcebf60c801b51f113fb https://twitter.com/i/web/status/1539870664232169472StopMalvertisin
2022-06-23 00:30:31DOCX -> CVE-2022-30190 -> #WarzoneRAT + #SnakeKeylogger. This sample is using Script Encoder and zipfldr.dll… https://t.co/5ET1U8S1m4 https://twitter.com/i/web/status/1539765427198316544nao_sec
2022-06-22 21:30:05#Follina (CVE-2022-30190, puntuación CVSS: 7,8), afecta a la herramienta de diagnóstico de soporte de #Windows, fue… https://t.co/IR0Hv56dak https://twitter.com/i/web/status/1539722173350297600EHCGroup
2022-06-22 19:50:31With the exploitation of CVE-2022-30190, see what additional behavior to investigate. https://t.co/8lXJ4du94z #MSDT #Malware https://www.sumologic.com/blog/threat-labs-msdt-vulnerability/SumoLogic
2022-06-22 17:32:54Staying Ahead of CVE-2022-30190 (Follina) https://t.co/Y7Bo2Soztm #cyber #threathunting #infosec https://t.co/ZYtuCjChG7 http://dlvr.it/SSfdnjblueteamsec1
2022-06-22 15:11:29CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-22 14:55:27#Follina CVE-2022-30190 https://t.co/CNc3KLeVem URL: http://195.58.49[.]68:7897/exploit.html (Unreachable) http://1… https://t.co/zmgXH7ihXR https://www.virustotal.com/gui/file/57e09a3e68c324c41eb7714282115ac6fd9e6ef9af00d5e089752f5c3d65c681 https://twitter.com/i/web/status/1539619689563045889StopMalvertisin
2022-06-22 13:30:17//🚨INFO//#AlerteCyber : Faille de sécurité dans les produits Microsoft Windows et Windows Server (CVE-2022-30190 al… https://t.co/yOTQL4mVzk https://twitter.com/i/web/status/1539597425291235330AssNaCoFin
2022-06-22 12:40:27Como explorar o Follina CVE-2022-30190 https://t.co/Jb1nvBRg3i https://redirectlink.minutodaseguranca.blog.br/6wkMindSec_Brasil
2022-06-22 03:11:22The latest update for #SumoLogic includes "Follina - CVE-2022-30190" and "Why end-to-end visibility is critical to… https://t.co/lOstSaPVIE https://twitter.com/i/web/status/1539445062848978944opsmatters_uk
2022-06-21 22:00:50As per Proofpoint, the flaw (CVE-2022-30190) is a #MicrosoftWindows vulnerability. It delivers the Qakbot, an infor… https://t.co/xd67rB5x7o https://twitter.com/i/web/status/1539364791084515328Cyberware_AI
2022-06-21 19:10:49Como explorar o Follina CVE-2022-30190 https://t.co/nHi9tYadfZ #mindsec #minutodaseguranca #informationsecurity… https://t.co/iikdKTtaKi https://redirectlink.minutodaseguranca.blog.br/dy0 https://twitter.com/i/web/status/1539323523914780672MindSec_Brasil
2022-06-21 18:30:17CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-21 17:31:28Russia’s #APT28 uses fear of nuclear war to spread #Follina (CVE-2022-30190) docs in Ukraine https://t.co/tSJg4uVJhO https://blog.malwarebytes.com/threat-intelligence/2022/06/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine/cudeso
2022-06-21 15:56:18The official June 2022 security updates are out but leaving a big hole... The CVE-2022-30190, popularly known as… https://t.co/hULDk2WGTD https://twitter.com/i/web/status/1539272873805811714NakedSecurity
2022-06-21 15:11:59CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-21 14:51:02Documentos de MS Office como puerta de entrada: la nueva vulnerabilidad CVE-2022-30190, conocida como Follina, perm… https://t.co/zVmxyZ9lvC https://twitter.com/i/web/status/1539256059772166145Arabsanet
2022-06-21 14:21:17Documentos de MS Office como puerta de entrada: la nueva vulnerabilidad CVE-2022-30190, conocida como Follina, perm… https://t.co/Jr6pdWoeaB https://twitter.com/i/web/status/1539247109962072065KasperskyLatino
2022-06-21 13:15:34Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 576.3K (audience size) CVE-2022-26134: 384.1K CVE-2022… https://t.co/S4Wi1vNcjA https://twitter.com/i/web/status/1539231674675908608CVEtrends
2022-06-21 10:20:16We watched Government sponsored hacking groups and #cybercrime hacking groups already exploited CVE-2022-30190… https://t.co/v3dPpawiZ8 https://twitter.com/i/web/status/1539190897757552641nshcthreatrecon
2022-06-21 08:20:28Learn how CrowdStrike Falcon Protects Customers from Follina (CVE-2022-30190) Read more: https://t.co/ZVE9bIW5w2… https://t.co/TsU4KV7LMj https://zcu.io/M3Ub https://twitter.com/i/web/status/1539159183454445568ami_viz
2022-06-21 07:30:43Understanding the Compound File Binary format and OLE structures to mess with CVE-2022-30190:… https://t.co/5zYT8tw0mu https://twitter.com/i/web/status/1539146786161426432blackstormsecbr
2022-06-21 03:40:06The recently disclosed 0-day in Microsoft Support Diagnostic Tool (MSDT), CVE-2022-30190, nicknamed Follina, is bei… https://t.co/kMQesouLPp https://twitter.com/i/web/status/1539089804972933121secalertsasia
2022-06-20 20:40:57"Understanding the Compound File Binary format and OLE structures to mess with CVE-2022-30190" https://t.co/R0MophwJPz https://danusminimus.github.io/2022/06/18/Understanding-OLE-Objects-and-Microsoft-Magic-to-mess-with-with-CVE-2022-30190(Follina).htmlcircl_lu
2022-06-20 20:10:14Referred to as Follina, the flaw is tracked as CVE-2022-30190. It affects multiple Office versions, including Offic… https://t.co/gopnnkIKSH https://twitter.com/i/web/status/1538974978108010498MyVirtualCISO
2022-06-20 19:50:13Dont mess with the #Follina CVE-2022-30190 !! Official patch is released by #Microsoft. Patch Now. Check our tons… https://t.co/8edeTO44d9 https://twitter.com/i/web/status/1538971787505147905vFeed_IO
2022-06-20 19:50:09Dont mess with the #Follina CVE-2022-30190 !! Official patch is released by #Microsoft. Patch Now. Check our tons… https://t.co/ROYANCqOYG https://twitter.com/i/web/status/1538971919298531335ToolsWatch
2022-06-20 17:20:32#Follina #CVE-2022-30190 https://t.co/S4WJHNkGOh 💩hxxps://upgrade.4nmn[.]com/microsoft.html#! #threathunting… https://t.co/0gYN3DHij3 https://labs.inquest.net/dfi/hash/b2ef2b2f6317d3cbee550953637eeaf7486b25db169d1335b94d195daefbbb65 https://twitter.com/i/web/status/1538934235872038913InQuest
2022-06-20 16:42:39#Follina CVE-2022-30190index.htm https://t.co/aqBumrQbNM https://aeternusmalus.wordpress.com/2022/06/20/follina-cve-2022-30190index-htm/d34dr4bbit
2022-06-20 16:12:09#Follina CVE-2022-30190 index.htm https://t.co/HB7kU9c8ew -> Working on their AV / EDR evasion http://159.75.135[.]… https://t.co/EoQegNgXIk https://www.virustotal.com/gui/file/3558840ffbc81839a5923ed2b675c1970cdd7c9e0036a91a0a728af14f80eff3 https://twitter.com/i/web/status/1538915850702712832StopMalvertisin
2022-06-20 15:15:21CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-20 14:11:25⚠️#Follina : des documents Office comme porte d’entrée. La nouvelle vulnérabilité CVE-2022-30190, alias #Follina, p… https://t.co/cUC9ssfnI9 https://twitter.com/i/web/status/1538884692937785346kasperskyfrance
2022-06-20 13:13:34Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-22620: 1M (audience size) CVE-2022-30190: 380.3K CVE-2022-261… https://t.co/GW1dlimBh0 https://twitter.com/i/web/status/1538869289545043970CVEtrends
2022-06-20 07:51:54#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/sbqZlI9ZgT https://twitter.com/i/web/status/1538790009209241600digitrackspl
2022-06-20 07:17:19Microsoft Wordなどを介して任意コード実行が可能なMSDTの脆弱性(CVE-2022-30190、Follina)の検証 : NECセキュリティブログ | NEC https://t.co/sWPYCSaWsz https://jpn.nec.com/cybersecurity/blog/220620/index.htmlfd0
2022-06-20 06:22:54#Follina CVE-2022-30190 Translates to "Questions.docx" https://t.co/pKzwH9OuDQ https://upgrade.4nmn[.]com/microsoft… https://t.co/cwrTX6iKT4 https://www.virustotal.com/gui/file/211a1f74eea68ebe7178d90f0df0446a87cdda865145c397b7a32e253086139e/detection https://twitter.com/i/web/status/1538766748249636869StopMalvertisin
2022-06-20 04:20:41「Windows のゼロデイ脆弱性 Follina CVE-2022-30190:Qbot のフィッシング攻撃が始まった」 https://t.co/Hg3GzlzO5c #Qbot https://iototsecnews.jp/2022/06/07/qbot-malware-now-uses-windows-msdt-zero-day-in-phishing-attacks/?fbclid=IwAR37IHmeBftd5-LVrUGCG-x5_PNNHVY9BmfN1Z4oAa-z9rTRDg_O-138rj8NobMiwa
2022-06-20 01:30:31■CVE-2022-30190 マイクロソフト サポート診断ツール(MSDT)の脆弱性について回避策のガイダンス 2/3 https://t.co/JRGCUwxrwN https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/t_nihonmatsu
2022-06-19 22:50:32Windows のゼロデイ脆弱性 Follina CVE-2022-30190:Qbot のフィッシング攻撃が始まった #security #vulnerability #follina #qbot https://t.co/wX29sBS7br http://iototsecnews.jp/2022/06/07/qbot-malware-now-uses-windows-msdt-zero-day-in-phishing-attacks/iototsecnews
2022-06-19 16:40:07Threat actors continue to leverage the CVE-2022-30190 vulnerability in the latest malicious email campaign aimed to… https://t.co/VKoF02eGHn https://twitter.com/i/web/status/1538561307355623426secalertsasia
2022-06-19 11:11:11Exploit Builder for CVE-2022-30190 is on Sale 🔴Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execut… https://t.co/J9g4d3ugI3 https://twitter.com/i/web/status/1538478859879911424DailyDarkWeb
2022-06-18 13:10:19Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 320.2K (audience size) CVE-2022-23088: 150.6K CVE-2022… https://t.co/OyZwtP9IFX https://twitter.com/i/web/status/1538144512610009094CVEtrends
2022-06-18 11:00:08CVE-2022-30190 (Follina) got patched in KB5014697 apparently.anarchyuki
2022-06-18 01:20:27Follina 「Follina」はファイルを解析した研究者によりつけられた通称で、Micorosftの与えた識別子は「CVE-2022-30190」です。(gigazine より) https://t.co/Dbxp3WBIU5 https://twitter.com/piyokango/status/1533719347545288705imasirunari
2022-06-17 20:25:21#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/ngxxIjYzS1 https://twitter.com/i/web/status/1537891592895246336MattHamlin12
2022-06-17 16:50:26Microsoft corrige la vulnérabilité 0day exploitée "Follina" annoncée fin mai "Cette vulnérabilité" CVE-2022-30190… https://t.co/7YuJEeAEoc https://twitter.com/i/web/status/15378393998404075540x1r3v3rs3x
2022-06-17 16:30:07Multiple threat actors are leveraging the Microsoft Office #vulnerability CVE-2022-30190 which allows an attacker t… https://t.co/G8ySQXfKyO https://twitter.com/i/web/status/1537834958525501440EclecticIQ
2022-06-17 15:11:50CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-17 14:01:18MS MSDT 포인트 발생한 취약점인 "Follina" 제로데이 CVE-2022-30190 익스플로잇을 간단히 해보려고 했는데 환경구축도 완전히 안되고 오랜만에 VM깔고 칼리 다운받다가 벌써 11시됨.. 시… https://t.co/7l8kSaGC7k https://twitter.com/i/web/status/1537795006953832448jayenjea998
2022-06-17 14:01:02⚠️#Follina : des documents Office comme porte d’entrée. La nouvelle vulnérabilité CVE-2022-30190, alias #Follina, p… https://t.co/Qr0UCjUaIn https://twitter.com/i/web/status/1537795219260940288kasperskyfrance
2022-06-17 13:10:43Find Arctic Wolf's recommendations for CVE-2022-30190. #EndCyberRisk https://t.co/fEFqZY66vr http://ow.ly/uiyq50JzqtMAWNetworks
2022-06-17 12:20:31CVE-2022-30190 - Updated Guidance for MSDT Remote Code Execution Zero-Day Vulnerability in Windows https://t.co/8Rlh21l7z0 #Cybersecurity https://arcticwolf.com/resources/blog/cve-2022-30190Gate_15_Analyst
2022-06-17 07:40:11Finally Microsoft patches the Follina Vulnerability CVE-2022-30190 #CVE #office #microsoft #rce… https://t.co/fXCqGLInFw https://twitter.com/i/web/status/1537699899986391040talos_security
2022-06-17 03:02:29Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center - https://t.co/b04MKVasEr https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/TheUnicornXXL
2022-06-16 23:50:35Microsoft、5月末発表の悪用されたゼロデイ脆弱性「Follina」を修正 https://t.co/Ta4hOik0p0 『この脆弱性「CVE-2022-30190」は診断ツール「Microsoft Support Di… https://t.co/iBApZAtiI9 https://www.itmedia.co.jp/news/articles/2206/16/news075.html#utm_term=share_sp https://twitter.com/i/web/status/1537583139559591937taku888infinity
2022-06-16 23:40:47“(MSDT)に関する脆弱性(CVE-2022-30190)」について、Microsoft 社は「悪用の事実を確認済み」と公表” お早めに / “マイクロソフトが6月のセキュリティ情報公開、WindowsのMSDTに関する脆弱性は… https://t.co/4jK7aAJVNK https://twitter.com/i/web/status/1537578351551868928igaos
2022-06-16 21:12:00CISA adds Critical Microsoft diagnostics tool vulnerability "Follina" (CVE-2022-30190) to Catalog of exploited vuln… https://t.co/PKVHDW4adt https://twitter.com/i/web/status/1537541787568549888securezoo
2022-06-16 18:02:50Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190) https://t.co/RHDpUoFBpN http://ow.ly/BuyZ103KeJ5Lori_Riot
2022-06-16 17:46:43Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/LOynm11LrM https://twitter.com/i/web/status/1537487677616181249MattHamlin12
2022-06-16 16:01:20#Follina CVE-2022-30190 Interesting email lure referencing the upcoming America East Sustainability Conference 2022… https://t.co/geEZlH7xra https://twitter.com/i/web/status/1537463417967366145StopMalvertisin
2022-06-16 15:20:57Microsoft have now issued a patch for the vulnerability found on May 30th called CVE-2022-30190- dubbed as Follina.… https://t.co/MZ0Dz3Ov4A https://twitter.com/i/web/status/1537453995672887305intersys
2022-06-16 15:20:11Microsoft corrige falha zero-day grave no Windows: conhecida como “Follina” (CVE-2022-30190), a vulnerabilidade pe… https://t.co/8N610K7mWB https://twitter.com/i/web/status/1537454916972724225BotDeschamps
2022-06-16 15:12:33CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-16 14:21:51Faille de sécurité⚠️⚠️ (CVE-2022-30190) Présente sur Windows, Elle permet de prendre Le contrôle à distance De vot… https://t.co/0T3TcOGBox https://twitter.com/i/web/status/1537437983351025664foka_godwill
2022-06-16 14:20:36Wichtig: Sicherheitsupdate von Microsoft schließt CVE-2022-30190: Update diesmal nicht aufschieben! https://t.co/3TkaQFNnww https://www.heise.de/news/Patchday-Microsoft-schliesst-MSDT-Luecke-die-auch-ohne-Makros-funktioniert-7141070.htmlcoke4all
2022-06-16 14:00:13Microsoft vient de publier un correctif concernant l'alerte de sécurité CVE-2022-30190 (Follina). Rendez-vous sur W… https://t.co/rrhzfg7YDX https://twitter.com/i/web/status/1537433704422727680edipoles_
2022-06-16 13:10:56Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-25845: 967.1K (audience size) CVE-2022-30190: 727.5K CVE-2022… https://t.co/zEhvwlEG2z https://twitter.com/i/web/status/1537419735457009665CVEtrends
2022-06-16 13:10:32The "Follina" remote code execution vulnerability (CVE-2022-30190) is fixed in the June 2022 cumulative Windows Upd… https://t.co/7CqLKKWQAJ https://twitter.com/i/web/status/1537421627960565760HelgeKlein
2022-06-16 12:50:11The vulnerability (CVE-2022-30190), first disclosed by Microsoft on May 30, exists in various current versions of O… https://t.co/AhI0ApAMHa https://twitter.com/i/web/status/1537416157745106945DecipherSec
2022-06-16 12:00:10#Follina CVE-2022-30190 溯源简报0614.docx 2022-06-16 from CN https://t.co/1dpaRu1mRX http://101.33.231[.]81:62563/explo… https://t.co/PP07YTvebZ https://www.virustotal.com/gui/file/6ddab79a6d836f9c1ed9ab3bbe28a074c0c93bd87f55144ed62b23c0032715d1/detection https://twitter.com/i/web/status/1537403718236520448StopMalvertisin
2022-06-16 11:40:06Microsoft Patches Follina (CVE-2022-30190) Windows Zero-Day:Update Now https://t.co/JCbc28KTFQ https://www.webmasterworld.com/microsoft_windows_os/5066561.htmWebmasterWorld
2022-06-16 10:30:12Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190) https://t.co/x9EG31CRfx http://ow.ly/YLzv103Kb5nAlicePintori
2022-06-16 10:20:04#Windows | Patch Tuesday di giugno: risolta la #vulnerabilità CVE-2022-30190 (Follina) https://t.co/BG51oPsq29 https://www.theregister.com/2022/06/15/microsoft_patch_tuesday/?td=rt-3asonoclaudio
2022-06-16 09:30:08Microsoft、5月末発表の悪用されたゼロデイ脆弱性「Follina」を修正 https://t.co/wS6EQEUJTR CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Mi… https://t.co/et6P3c0S3S https://www.itmedia.co.jp/news/articles/2206/16/news075.html https://twitter.com/i/web/status/1537365554339917824cyber_edu_jp
2022-06-16 09:20:29CVE-2022-30190 Temporary Fix These are two Python scripts compiled to easily and quickly apply temporary protectio… https://t.co/x03AOHfCek https://twitter.com/i/web/status/1537361965051527169hack_git
2022-06-16 09:10:04@MirsoltaniMahdi شانس نداریم ما اگه دو سال پیش خونده بودیمش به جا CVE-2022-30190 الان CVE-2020-30190 بود.mohiyamini
2022-06-16 07:09:32#Microsoft released security updates to address 55 vulnerabilities, including CVE-2022-30190 dubbed as "Follina" t… https://t.co/7lM2Ml1nvX https://twitter.com/i/web/status/1537327840261287937certbe
2022-06-16 05:20:37❗️Security Advisory Alert❗️ Microsoft has released a patch for the CVE-2022-30190 vulnerability dubbed "Follina" th… https://t.co/hrXdC6hlRv https://twitter.com/i/web/status/1537302698969661440loop_secure
2022-06-15 22:15:03CVE-2022-30190 is a Microsoft zero-day vulnerability with a CVSS V3 score of 7.8. We recommend admins to follow the… https://t.co/Rn5mys2wxm https://twitter.com/i/web/status/1537193441762889731CswWorks
2022-06-15 19:40:20A fix for "Follina," the high-severity #Windows vulnerability — tracked as CVE-2022-30190 — has finally been releas… https://t.co/v4AusbRZe6 https://twitter.com/i/web/status/1537157997239193600techhelpkb
2022-06-15 18:33:46CVE-2022-30190 https://t.co/UKQQ6gJI8w #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-15 15:30:13Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190) https://t.co/86CHUAJzuP http://ow.ly/3Qze103K3vPdansantanna
2022-06-15 15:10:27CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-15 14:40:35Microsoft schließt Follina-Schwachstelle (CVE-2022-30190) in Windows mit Juni 2022-Updates https://t.co/7YEHPK7wth https://buff.ly/3MRD15OMonitoring_IT
2022-06-15 14:40:30Follina Vulnerability (CVE-2022-30190) Attack Using 'Antimicrobial Film Request' File https://t.co/YhoNAyXLTH https://asec.ahnlab.com/en/35343/RobertScharf18
2022-06-15 14:21:13Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/pvMPr5hGJG https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/TheL0singEdge
2022-06-15 14:21:11Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/9jxPKOAqzj https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/JanMartijn
2022-06-15 14:21:05⚠️ SECURITY ADVISORY Since May, cybercriminals have been abusing the Follina vulnerability CVE-2022-30190. Yest… https://t.co/uTFt5oo3rj https://twitter.com/i/web/status/1537076090983833604Broadleaf_Group
2022-06-15 14:00:06Microsoft have released a patch to address the vulnerability (CVE-2022-30190) that exists in the Microsoft Support… https://t.co/p5GQG5vXik https://twitter.com/i/web/status/1537071762143330305ncsc_gov_ie
2022-06-15 13:50:04Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190) https://t.co/Re9PZ0THXz http://ow.ly/E2M2103K2Qabarish_jeff
2022-06-15 13:30:19GitHub - MalwareTech/FollinaExtractor: Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files… https://t.co/a2lUFJqhe2 https://twitter.com/i/web/status/1537062758746796032nichii_a
2022-06-15 13:11:12Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 3.4M (audience size) CVE-2022-22620: 1.3M CVE-2022-301… https://t.co/JKNV5fSYaB https://twitter.com/i/web/status/1537057347453034499CVEtrends
2022-06-15 12:10:18Runecast Response to CVE-2022-30190 Microsoft #Vulnerability ⚠️👇 https://t.co/Uuu5SvmDxT https://hubs.li/Q01dpVHk0Runecast
2022-06-15 11:22:43I've uploaded a short demo video showcasing Aurora Lite (free) detecting & preventing CVE-2022-30190 / #Follina exp… https://t.co/bCQQQF5HIP https://twitter.com/i/web/status/1537029873029599233cyb3rops
2022-06-15 11:01:15CVE-2022-30190Zonix935
2022-06-15 10:50:09Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190) https://t.co/tWuBki8Rmr http://ow.ly/RTKa103K1BSArt_Capella
2022-06-15 10:30:45CVE-2022-30190 Another patch point: $( is filtered in msdt.exe and cannot use "; https://t.co/sXvL25NaMA https://t.co/HmzNxIZV6q https://twitter.com/80vul/status/153697430797209190480vul
2022-06-15 10:30:42Microsoft patches Follina vulnerability (CVE-2022-30190) in Windows with June 2022 updates https://t.co/Oh3vOFmgd1… https://t.co/FBriUg870k https://borncity.com/win/?p=24874 https://twitter.com/i/web/status/1537015832009752578etguenni
2022-06-15 10:30:40June 2022 Patch Tuesday brought official Microsoft fixes for CVE-2022-30190 / Follina. They are functionally identi… https://t.co/qhBnkY8lL6 https://twitter.com/i/web/status/15370158441815244810patch
2022-06-15 10:30:36IPAからメール来てた。悪用の事実が確認されたCVE-2022-30190の脆弱性を修正するパッチが出たよって。 https://t.co/90LCtg0DSt https://www.ipa.go.jp/security/ciadr/vul/20220615-ms.htmlfujita20200926
2022-06-15 10:30:272022년 6월 15일자 MS 보안패치 개별 다운로드 - CVE-2022-30190 및 상세정보 : https://t.co/IShT4vJ0nL http://naver.me/FSQ8BpKHvirusmyths
2022-06-15 09:53:40Correction: independently of the above, Microsoft did implement the same patch for CVE-2022-30190/Follina as 0patch… https://t.co/U4PRoeM5xl https://twitter.com/i/web/status/1537007336807616512mkolsek
2022-06-15 09:51:03.@FortiGuardLabs Threat Signal Report: Qakbot Delivered Through CVE-2022-30190 (Follina) ⮕ https://t.co/wcdh6QjMc1 https://t.co/yMFqGhaBo8 https://ftnt.net/6014zjooEChrisRobertsSec
2022-06-15 09:40:27■■■■□ Follina patch CVE-2022-30190. (msdt.exe) is out. https://t.co/BQ4LqVtyU3 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190cKure7
2022-06-15 09:22:10Microsoft schließt Follina-Schwachstelle (CVE-2022-30190) in Windows mit Juni 2022-Updates https://t.co/iz7IMisxEp… https://t.co/eKX2n4IeLZ https://www.borncity.com/blog/2022/06/15/microsoft-schliet-follina-schwachstelle-cve-2022-30190-in-windows-mit-juni-2022-updates/ https://twitter.com/i/web/status/1537000356785315840etguenni
2022-06-15 09:03:58By me @Forbes: Although the fix didn't make the documentation, #Microsoft *has* fixed CVE-2022-30190 it would seem.… https://t.co/yehMC8qO29 https://twitter.com/i/web/status/1536995255182032896happygeek
2022-06-15 08:22:22FollinaExtractor Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files https://t.co/5mk7jOY7He G… https://t.co/ofuGib1NgA https://github.com/MalwareTech/FollinaExtractor https://twitter.com/i/web/status/1536984542329856001hack_git
2022-06-15 07:51:14💡マイクロソフト、月例パッチでFollinaなどCVE55件に対処(CVE-2022-30190ほか) 📃新たなLinuxルートキットSyslogkについてアバストが解説 🚨Confluenceの脆弱性を複数の敵対者が悪用と、… https://t.co/ckDshHn9c6 https://twitter.com/i/web/status/1536978597675560960MachinaRecord
2022-06-15 06:31:24Follina(CVE-2022-30190)の修正を含みます。 マイクロソフト、6月の月例パッチ--リモートコード実行など脆弱性55件を修正 - CNET Japan https://t.co/GOJxWTXsKJ https://japan.zdnet.com/article/35188965/ntsuji
2022-06-15 06:21:17Windows のマイクロソフト サポート診断ツール ( MSDT) に関する脆弱性「通称:Follina」(CVE-2022-30190)も今月の累積更新プログラムで修正されています。 早めに適用しましょう! https://t.co/w4karXy6BP https://twitter.com/A_zs_Blog/status/1536900029432340480A_zs_Blog
2022-06-15 06:21:08CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス https://t.co/DnpsnWIBLI https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/A_zs_Blog
2022-06-15 05:30:26#Follina CVE-2022-30190 https://t.co/a8SfLADMXX index.html Submitted 2022-06-15 from CH https://cdn.discordapp[.]co… https://t.co/JugeUMWNOi https://www.virustotal.com/gui/file/c61fe40f46226d24f0f17c46acc4db6a0091c68abc6a3d995b3f6df1bbfcbb1e/detection https://twitter.com/i/web/status/1536942641245716480StopMalvertisin
2022-06-15 05:20:25A severe Zero-day vulnerability ‘Follina’ (CVE-2022-30190) has been exposed in Microsoft Support Diagnostic Tool. H… https://t.co/TTTdCf8Vj4 https://twitter.com/i/web/status/1536941049217974272Seqrite
2022-06-15 05:00:34Mentioned #Follina CVE-2022-30190 Samples Docx https://t.co/FohkqeicKk Html https://t.co/lmton1LwoB Ps1… https://t.co/vazspuK2PS https://bazaar.abuse.ch/sample/52b48c4b2f4a63fc6611dea7e9146a440d41e306143788ea20c56c3ab292cf00/ https://bazaar.abuse.ch/sample/2cdd875b905065d9e35e323eb56f8f5b1dca141be94da35f79daf833d88728a7/ https://twitter.com/i/web/status/1536934495122857984JAMESWT_MHT
2022-06-15 04:10:26#Follina CVE-2022-30190 https://t.co/BYbeMjKGqt 王师秉节.docx -> Wang Shibing Festival.docx Submitted: 2022-06-14 from… https://t.co/sTFXzU9tZO https://www.virustotal.com/gui/file/52b48c4b2f4a63fc6611dea7e9146a440d41e306143788ea20c56c3ab292cf00/detection https://twitter.com/i/web/status/1536921844561096704StopMalvertisin
2022-06-15 04:10:05FollinaのCVE-2022-30190の修正パッチも含まれてリリースされました。 マイクロソフト、6月の月例パッチ--リモートコード実行など脆弱性55件を修正 https://t.co/iHxiDmkhRR @cnet_japanより https://japan.cnet.com/article/35188965/tb2400MP
2022-06-15 04:00:07https://t.co/EZlw4Vr9dV The official patch for CVE-2022-30190 is released. Added regular filtering to the RunScript… https://t.co/NjzsXeFwnO https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190 https://twitter.com/i/web/status/153692023325596876980vul
2022-06-15 03:20:05En las actualizaciones del mes de junio liberadas por Microsoft se parcha Follina (CVE-2022-30190)… https://t.co/uEny4c4hJQ https://twitter.com/i/web/status/1536911208686800898SteckMera
2022-06-15 02:50:272022年6月マイクロソフトセキュリティ更新プログラムに関する注意喚起を公開。MSDTの脆弱性(CVE-2022-30190)の修正も含まれています。セキュリティ更新プログラムの早期適用をご検討ください。^KK https://t.co/WjSKwRdcDW https://www.jpcert.or.jp/at/2022/at220016.htmljpcert
2022-06-15 02:30:22Made a simple example extractor for getting payload urls from Follina (CVE-2022-30190) docx and rtf files https://t.co/4MhEynQDAt https://github.com/MalwareTech/FollinaExtractormalwaretech
2022-06-15 00:40:22#windowsupdate #microsoft 5 月 30 日に公表済みで悪用を確認しているもの 1 件. CVE-2022-30190 MSDT のリモートでコードが実行される脆弱性 悪用は確認されていないが,緊急 3… https://t.co/zdkyu6MG65 https://twitter.com/i/web/status/1536869867730575366kawn2020
2022-06-15 00:40:14follina CVE-2022-30190 対策のセキュリティアップデートです。 Security Updatesセクションで、自分のOSビルド確認して、対象KBがインストールされていることを確認しましょう。MojageClub
2022-06-15 00:20:265/30 に公開した CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) (“Follina”とも呼ばれる)の脆弱性を修正を公開しました。修正は、6月の月… https://t.co/nvT7JhSAkt https://twitter.com/i/web/status/1536864272566738944EurekaBerry
2022-06-14 23:40:59CVE-2022-30190 - Security Update Guide - Microsoft - Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code E… https://t.co/K1cuK6pnlB https://twitter.com/i/web/status/1536854751627051008tz_ak
2022-06-14 23:20:14マイクロソフトがFollina(CVE-2022-30190)とその他55 脆弱性を修正。細工されたNFSサービス呼び出しでの遠隔コード実行(CVE-2022-30136)は特定バージョンのWindows Serverにのみ影響だ… https://t.co/8rNfa3qzg1 https://twitter.com/i/web/status/1536849817988608000__kokumoto
2022-06-14 22:00:44🚨CVE-2022-30190 added to the KEV. Time to patch! https://t.co/5h9tSjQXF2 https://twitter.com/USCERT_gov/status/1536825024312709123CISAJen
2022-06-14 22:00:050dayとして悪用が報告されていたMSDTの脆弱性 #follina (CVE-2022-30190)を修正するセキュリティアップデートが公開されました🦜 https://t.co/J4lhntK68T https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190piyokango
2022-06-14 21:50:39CVE-2022-30190 (Follina): Zero day e Zero click - Vulnerabilidade no MSDT https://t.co/nYNI9Zb4aM https://blog.ecoit.com.br/cve-2022-30190-follina-zeroday-zeroclick/ecoit_
2022-06-14 21:30:18https://t.co/Kd4K1rqrRA Detect the Follina MSDT Vulnerability (CVE-2022-30190) with Qualys Multi-Vector EDR & Context XDR #cybersecurity https://blog.qualys.com/product-tech/2022/06/14/detect-the-follina-msdt-vulnerability-cve-2022-30190-with-qualys-multi-vector-edr-context-xdrnetsecu
2022-06-14 21:00:34Detect the Follina MSDT Vulnerability (CVE-2022-30190) with Qualys Multi-Vector EDR & Context XDR: A new remote cod… https://t.co/E0WTkvLlg7 https://twitter.com/i/web/status/1536813998607282176shah_sheikh
2022-06-14 21:00:32Detect the Follina MSDT Vulnerability (CVE-2022-30190) with Qualys Multi-Vector EDR & Context XDR… https://t.co/5gdRnNLI6P https://twitter.com/i/web/status/1536814006752583680AcooEdi
2022-06-14 19:20:12ms-msdtの一部、ゼロクリックもイケる脆弱性 CVE-2022-30190 の修正パッチ、今日未明のWindowsUpdateに含まれてた。やったー。 https://t.co/lDeFLHxgyA https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190hinoshiba
2022-06-14 19:00:04Microsoft has finally patched the Windows vulnerability known as Follina and CVE-2022-30190, two years after its ro… https://t.co/ouLALnyRGJ https://twitter.com/i/web/status/1536785291259674624EduardKovacs
2022-06-14 18:46:27Follina patch CVE-2022-30190. (msdt.exe) is out. https://t.co/bWTfNHiBxW https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190HackingDave
2022-06-14 18:46:04For those looking for the Follina / CVE-2022-30190 update in the June 2022 Patch Tuesday updates, take note: Despit… https://t.co/Ozg1v15AOl https://twitter.com/i/web/status/1536765871179325440wdormann
2022-06-14 18:44:33@sans_isc FYI, CVE-2022-30190, follina is included, kb5014699, 5014678, etcdarth_gaul
2022-06-14 18:42:05@GossiTheDog Do you have a sense of whether they addressed ALL the aspects of CVE-2022-30190 (including the ones th… https://t.co/El8VonHW4F https://twitter.com/i/web/status/1536773571271352321investigatorchi
2022-06-14 18:41:30CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-14 15:16:43CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-14 14:43:33Documentos de MS Office como puerta de entrada: la nueva vulnerabilidad CVE-2022-30190, conocida como Follina, perm… https://t.co/Bd70b5MxkA https://twitter.com/i/web/status/1536719237988986881Arabsanet
2022-06-14 14:22:42#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/eevEdNiqD1 https://twitter.com/i/web/status/1536713831199739906ArrowSecurity
2022-06-14 14:14:59Documentos de MS Office como puerta de entrada: la nueva vulnerabilidad CVE-2022-30190, conocida como Follina, perm… https://t.co/PRzrqTDIHk https://twitter.com/i/web/status/1536710121954365446KasperskyLatino
2022-06-14 12:14:12CERT-UA warns of new attacks exploiting #CVE-2022-30190 vulnerability aka #Follina attributed to #Sandworm APT and… https://t.co/BrExjOawqQ https://twitter.com/i/web/status/1536679893647474688SOC_Prime
2022-06-14 07:51:26Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/MqOg9CBELM https://twitter.com/i/web/status/1536615682007236608digitrackspl
2022-06-14 05:30:04『攻撃は大量の電子メール送信から始まり、CVE-2022-30190として追跡されている脆弱性を悪用して「CrescentImp」と呼ばれるマルウェアに感染させるというもの。UCRT-UAによると、攻撃にはロシア軍に属する脅威グル… https://t.co/EGxCf6QRVg https://twitter.com/i/web/status/1536581053275832320CharStream
2022-06-14 01:10:18CVE-2022-30190 #Detection Extended For #Directory_Traversal https://t.co/Q7eZQNtXmV https://vapt.me/DirectoryTraversalomvapt
2022-06-13 22:50:54Windows のゼロデイ脆弱性 Follina CVE-2022-30190 は ProtocolNightmare になるのか? #security #vulnerability #zeroday #windows https://t.co/6BBop1NrwM http://iototsecnews.jp/2022/06/01/new-windows-search-zero-day-added-to-microsoft-protocol-nightmare/iototsecnews
2022-06-13 21:11:47「ウクライナのコンピュータ緊急対応チーム(CERT)は、ロシアにリンクされたサンドワームAPTが最近発見されたフォッリーナRCEを悪用している可能性があると警告しています。CVE-2022-30190として追跡されているこの問題は… https://t.co/mh0lIJiGv2 https://twitter.com/i/web/status/1536454929673375744foxbook
2022-06-13 20:00:13🚀FIX MSDT Vulnerability using SCCM and Intune | CVE-2022-30190 ➡️ https://t.co/zDIDuR5Z6T https://t.co/EOFtbbu83r https://www.anoopcnair.com/fix-msdt-vulnerability-using-sccm-intune-30190/anoopmannur
2022-06-13 19:02:43@MrTiepolo CVE-2022-30190 not 30199?attritionorg
2022-06-13 18:36:33CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-13 17:01:27Thank you @JuniperNetworks @Mounirhahad for the Early Share with @CyberAlliance: CVE-2022-30190: Microsoft Windows… https://t.co/gdppWAW6La https://twitter.com/i/web/status/1536391927494430721CyberAlliance
2022-06-13 15:19:17CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-13 15:11:43Ukraine's CERT warns, Russian hacking group Sandworm may be exploiting Follina (CVE-2022-30190), a remote code exec… https://t.co/tltW7ThJXN https://twitter.com/i/web/status/1536360348487409667Ax_Sharma
2022-06-13 12:00:40🔆FIX MSDT Vulnerability using SCCM and Intune | CVE-2022-30190 ➡️ https://t.co/zDIDuR5Z6T https://t.co/cse1QN8OGA https://www.anoopcnair.com/fix-msdt-vulnerability-using-sccm-intune-30190/anoopmannur
2022-06-13 10:20:20Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/xL665eLS5f https://twitter.com/i/web/status/1536292034113331201ArrowSecurity
2022-06-13 09:50:28Follina CVE-2022-30190 Detection with THOR and Aurora #infosec #infosecurity #cybersecurity #threatintel… https://t.co/Oi4Xkj1vC4 https://twitter.com/i/web/status/1536283664442597376CyberIQs_
2022-06-13 07:35:05#Follina, CVE-2022-30190, is the new unpatched flaw in the Office which allows attackers to exploit the targeted de… https://t.co/SwdEtJvaS7 https://twitter.com/i/web/status/1536247538457923584kratikal
2022-06-13 04:20:33#Follina CVE-2022-30190 https://t.co/4pOhrwGALO ความเห็นกลางของ CII ต่อร่างประมวลฯ.docx -> Central opinion of the C… https://t.co/5i0tx7RLI1 https://www.virustotal.com/gui/file/a67ae3005d1780b24afe064e735b69db634727a1df83f0e98f9a74ffb87f8cd9/detection https://twitter.com/i/web/status/1536201426351046656StopMalvertisin
2022-06-13 04:14:13聊下最近的 CVE-2022-30190 https://t.co/c3ZbSVB1VG https://t.co/Dw7KLnc87T https://ift.tt/5BuUDGE https://ift.tt/FOS8wYWbuaqbot
2022-06-13 04:13:19#Follina CVE-2022-30190 https://t.co/WfAlbuPthQ URL: http://45.11.19[.]116:8000/index.html Unreachable, wonder what… https://t.co/QSyTs5ZIuX https://www.virustotal.com/gui/file/f72535f5bfcd113aaf215f2125ffd02f59f6981ba5e5f31d14d7a97509c8a0d3/detection https://twitter.com/i/web/status/1536197952217448448StopMalvertisin
2022-06-13 03:51:22#Follina CVE-2022-30190 MD5 this time 348bb87a7cd0a8e17e8246960c35f588 0fd4a38b7e6c3c778ca86a42e368582a 005f04cdcfd… https://t.co/TyNgm1TPJt https://twitter.com/i/web/status/1536193725407596544StopMalvertisin
2022-06-12 21:20:19👉🏼 He creado un script simple para ejecutar la corrección de la vulnerabilidad CVE-2022-30190 (Follina). Es un scr… https://t.co/Otbg7vD3tK https://twitter.com/i/web/status/1536095133183229954jose_oteroo
2022-06-12 16:00:16@David_lifshitz #CVE-2022-30190Baruch20288287
2022-06-12 15:10:42Die neue Schwachstelle CVE-2022-30190, auch #Follina genannt, ermöglicht den Exploit des Windows Support Diagnostic… https://t.co/Ck8wecx9Kt https://twitter.com/i/web/status/1536000557579702273Kaspersky_DACH
2022-06-12 15:10:34CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-12 14:40:34Well written and explained: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability #Microsoft… https://t.co/bQMmOp4Zne https://twitter.com/i/web/status/1535992842602090496ThomasKurth_ch
2022-06-12 13:14:45Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 549.3K (audience size) CVE-2022-23222: 405.4K CVE-2022… https://t.co/uXvXoVcoOR https://twitter.com/i/web/status/1535970186058137600CVEtrends
2022-06-12 13:14:01Caution! Microsoft Office Zero-day Vulnerability Follina (CVE-2022-30190) https://t.co/AR7CKipwBU https://asec.ahnlab.com/en/34998/davidkoepi
2022-06-12 12:32:23##CVE-2022-30190Baruch20288287
2022-06-12 08:20:19TA570 Qakbot (#Qbot) tries CVE-2022-30190 (Follina) exploit https://t.co/QyTbiKHypG https://t.co/Nu4fHAjCmQ https://t.me/PentestingNews/24323PentestingN
2022-06-11 18:13:10.@FortiGuardLabs Threat Signal Report: Qakbot Delivered Through CVE-2022-30190 (Follina) ⮕ https://t.co/fCiluJtvht https://t.co/zpU4VVQPP6 https://ftnt.net/6016zwUxoW_Gartner
2022-06-11 18:00:57My new video on understanding the #Follina #msdt (CVE-2022-30190) vulnerability. Enjoy! 🔥🥷 https://t.co/tKPbNJhO2b https://youtu.be/G_CFSF4Vh-sMalFuzzer
2022-06-11 15:12:16CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-11 13:50:14مايكروسوفت نزلت ال blog دى للحمايه من خطر Follina CVE-2022-30190 Microsoft Support Diagnostic Tool (MSDT) in Window… https://t.co/zWZ5oqbeUm https://twitter.com/i/web/status/1535618844009676800Mohamed87Khayat
2022-06-11 12:40:16#Wajakoyahthe5th #infosec #CyberSecurity coffee with msdt-#Follina CVE-2022-30190 🔥🔥 and #KendrickLamar Weekend's… https://t.co/RgXYHUTHPp https://twitter.com/i/web/status/1535601001192890370_Lord_Heathen
2022-06-11 12:10:09The vulnerability, CVE-2022-30190, is in the #Microsoft Support Diagnostic Tool (#MSDT) in Windows and is already b… https://t.co/pg9tfgrlr7 https://twitter.com/i/web/status/1535592956836577281EChavarro
2022-06-11 03:43:08GitHub Trending Archive, 09 Jun 2022, Python. TeamYukki/YukkiChatBot, komomon/CVE-2022-30190-follina-Office-MSDT-Fi… https://t.co/usiCpoQpqr https://twitter.com/i/web/status/1535464359299665925motakasoft
2022-06-11 01:00:06exploit - Does only having Microsoft Office installed make you vulnerable to the CVE-2022-30190 RCE or having Windo… https://t.co/PJFYKIy1My https://twitter.com/i/web/status/1535426385698750465secalertsasia
2022-06-10 23:40:04exploit - Does only having Microsoft Office installed make you vulnerable to the CVE-2022-30190 RCE or having Windo… https://t.co/YztM8jCf8l https://twitter.com/i/web/status/1535405530440769537secalertsasia
2022-06-10 21:50:51📣 Vulnerability (Follina) CVE-2022-30190 allows the Microsoft Support Diagnostics Utility to be abused via the ms-… https://t.co/B8BLn85M9m https://twitter.com/i/web/status/1535377015502647296evernetco
2022-06-10 21:30:16#Follina CVE-2022-30190 Lorem ipsum text. html > cdec208ec12fa58c122db1887abb7f58c7998a9ba6eeebffc501e11de3975215… https://t.co/ZUvRjrZkvJ https://twitter.com/i/web/status/1535372451479453696DmitriyMelikov
2022-06-10 21:11:07In this week's #ThreatLandscape, Microsoft announced a new vulnerability (CVE-2022-30190, Follina) relating to the… https://t.co/MUtLQgOawX https://twitter.com/i/web/status/1535366342571720704RelativityHQ
2022-06-10 20:11:10Microsoft Guidance for Follina: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool https://t.co/dEPMsOGUD9 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/Lulztigre
2022-06-10 19:30:49TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt) posted by AlienVault on @AlienVault OTX: /puls… https://t.co/8euqHCeTWn https://twitter.com/i/web/status/1535341262936473600UpsidedownCanuk
2022-06-10 18:30:25CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-10 16:20:51How to Fix MSDT Vulnerability using SCCM and Intune | CVE-2022-30190 https://t.co/dlfZfyFSgz #security #ctftime #ctf https://www.reddit.com/r/securityCTF/comments/v982ck/how_to_fix_msdt_vulnerability_using_sccm_and/SecurityCTF
2022-06-10 16:00:18CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/B7iEi4rDes https://t.co/RL1lDIzhrz https://ift.tt/itOmbo6 https://ift.tt/3z4jR2gbuaqbot
2022-06-10 16:00:16Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/ngh5DAWsFl https://twitter.com/i/web/status/1535288938092429312ChrisRobertsSec
2022-06-10 15:50:09"Securelist": CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction ... mas info aqui… https://t.co/GL7uwyA0tG https://twitter.com/i/web/status/1535286947278639106FINSIN_CL
2022-06-10 15:10:32CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-10 14:50:19State-Backed hackers exploit Microsoft "Follina" bug to target entities in Europe and US. Remote code CVE-2022-30190(CVSS score: 7.8)BlacB
2022-06-10 14:00:06Related mail file CVE-2022-30190 https://t.co/2yOeFm7a2B https://t.co/T68Rc5fYiO https://t.co/pswmUKqt5K https://twitter.com/h2jazi/status/1534897064391344133 https://app.any.run/tasks/94e0e1c9-2f6d-44ad-bf90-a5d4a933c942/AnonInsideWORLD
2022-06-10 13:40:05CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT #infosec #infosecurity #cybersecurity #threatintel… https://t.co/T2a3DkZKZK https://twitter.com/i/web/status/1535253895383072770CyberIQs_
2022-06-10 13:10:33Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 530K (audience size) CVE-2022-31625: 371.1K CVE-2022-3… https://t.co/RI1KpMuhQz https://twitter.com/i/web/status/1535245406824710146CVEtrends
2022-06-10 12:50:14https://t.co/PkV5jvpuQX CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild #cybersecurity https://www.seqrite.com/blog/cve-2022-30190-zero-day-vulnerability-follina-in-msdt-exploited-in-the-wild/netsecu
2022-06-10 12:10:10📢 #Exploit #Microsoft #ZeroDay #Vulnerability #Follina (CVE-2022-30190) ↔️ https://t.co/hLRuPQbJqR https://t.co/GcxkTYtHik https://github.com/Hrishikesh7665/Follina_Exploiter_CLIjorgemieres
2022-06-10 11:50:18"Seqrite Blog": CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild ... mas info aqui… https://t.co/0gh9dHHsJo https://twitter.com/i/web/status/1535226570977181698FINSIN_CL
2022-06-10 10:50:10Related mail file CVE-2022-30190 https://t.co/c53ClKkYv0 https://t.co/8YsG8bVYJd https://t.co/HEwHF6VLHR https://twitter.com/h2jazi/status/1534897064391344133 https://app.any.run/tasks/94e0e1c9-2f6d-44ad-bf90-a5d4a933c942/nao_sec
2022-06-10 10:40:08@StopMalvertisin @malwrhunterteam @1ZRR4H @luigi_martire94 Mentioned #Follina CVE-2022-30190 Samples Doc👇… https://t.co/PCwKalNj7y https://twitter.com/i/web/status/1535207850988937217JAMESWT_MHT
2022-06-10 09:20:19#Follina Exploiter_CLI Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190) https://t.co/xpn8I32Als… https://t.co/yVgVgU1PF4 https://github.com/Hrishikesh7665/Follina_Exploiter_CLI https://twitter.com/i/web/status/1535187681222729728hack_git
2022-06-10 09:20:06#Follina CVE-2022-30190 https://t.co/uWR6pvxdYK TranQuangDai.docx Submitted: 2022-06-10 from VN URL: https://update… https://t.co/EbgJomFUh7 https://www.virustotal.com/gui/file/719a07f46b6fce1615a7b4bd1ed3e4d2cb86d7275ae37d3325ff2e9db64e2185/details https://twitter.com/i/web/status/1535189817566597120StopMalvertisin
2022-06-10 08:50:07.@FortiGuardLabs Threat Signal Report: Qakbot Delivered Through CVE-2022-30190 (Follina) ⮕ https://t.co/XQV2m1RkPu https://t.co/NUiV920Wyk https://ftnt.net/6018zZfvKbeat_erb
2022-06-10 08:00:17.@FortiGuardLabs provides an analysis and assessment to date of CVE-2022-30190: MSDT RCE vulnerability “#Follina.”… https://t.co/FI4eEAFzqg https://twitter.com/i/web/status/1535167902474809345ChrisRobertsSec
2022-06-10 07:00:07Do you use #MDE and want to check your security stance on #CVE-2022-30190 #Follina? There is a new column "Mitigat… https://t.co/k6KJh8uydD https://twitter.com/i/web/status/1535152626395975682fabian_bader
2022-06-10 03:44:07GitHub Trending Archive, 08 Jun 2022, Python. jbaines-r7/through_the_wire, komomon/CVE-2022-30190-follina-Office-MS… https://t.co/IWoZ8X2e3g https://twitter.com/i/web/status/1535101973825228801motakasoft
2022-06-10 03:40:34MSDT の脆弱性 CVE-2022-30190 (Follina) 結構ヤバめだな。kktryj
2022-06-10 02:00:10タニウムBlog 【MS診断ツールのゼロデイ脆弱性Follina(CVE-2022-30190)】 2022年5月30日に公開された脆弱性について、ぜひご一読ください! https://t.co/ZmCsO66xIJ… https://t.co/vBz0B0EQgo https://www.tanium.jp/blog/zero-day-vulnerability-in-ms-diagnostic-tool-follina-cve-2022-30190/ https://twitter.com/i/web/status/1535079300138942484TaniumJ
2022-06-10 01:00:37#FortiGuardLabs Threat Signal Report: Qakbot Delivered Through CVE-2022-30190 (Follina) ⮕ https://t.co/bPXfp4SpFC https://t.co/FjAYFoi2Oe https://ftnt.net/6017zZvSvFortiGuardLabs
2022-06-09 19:13:31Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/hD5UjKYNUE https://twitter.com/i/web/status/1534973860122087425itblueprint
2022-06-09 18:52:47Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/4wDxDAiogw https://twitter.com/i/web/status/1534969837302206493Edge_worx
2022-06-09 18:42:44Qbot(Qakbot)の拡散にFollina(CVE-2022-30190)を悪用されているとのこと。Qbotはランサムウェアの先行マルウェアにも使われていますね。 Hackers using Follina Windows… https://t.co/jYHaLcNG6q https://twitter.com/i/web/status/1534967509237235712ntsuji
2022-06-09 18:35:27CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-09 18:11:38Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/W21Pofsgf6 https://twitter.com/i/web/status/1534959516453851139itblueprint
2022-06-09 18:00:56Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/SGkqXkNC7I https://twitter.com/i/web/status/1534957753516580865Gl7Grupo
2022-06-09 17:54:51Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/zvIL5oW2DM https://twitter.com/i/web/status/1534954736230797314ICSGetsIT
2022-06-09 17:32:39Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/S6mfMnuX7t https://twitter.com/i/web/status/1534948693803163649hytekcomputers
2022-06-09 17:26:13Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/22G43OKL8f https://twitter.com/i/web/status/1534946429818609665mgari78
2022-06-09 17:14:03Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/MgwqIZokt7 https://twitter.com/i/web/status/1534943913106190336EBSolutionCA
2022-06-09 17:13:41Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/gPYOUkyVun https://twitter.com/i/web/status/1534944164026236928fuselogix
2022-06-09 17:02:53Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/kv8MMB3LvR https://twitter.com/i/web/status/1534941899294924803stigroup
2022-06-09 17:01:12Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/XTRdi3amm4 https://twitter.com/i/web/status/1534942150806339590barryfein
2022-06-09 17:00:47Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/sCwEH36KNR https://twitter.com/i/web/status/1534942402464579586hutton647
2022-06-09 16:58:00Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/fm4e1eCuku https://twitter.com/i/web/status/1534936110786387970InfoSecAcumen
2022-06-09 16:56:42Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/D36UFDKdxH https://twitter.com/i/web/status/1534939637042520071systems_managed
2022-06-09 16:56:19Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/0noKmJRgMb https://twitter.com/i/web/status/1534939640804913154securityinfras
2022-06-09 16:55:28Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/11TruHMZC1 https://twitter.com/i/web/status/1534939886138142721jdpatfield
2022-06-09 16:52:03Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/zzwBsMtkog https://twitter.com/i/web/status/1534937124482555908ICT_NETWORK_SYS
2022-06-09 16:43:03Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/j9qtF0iGqf https://twitter.com/i/web/status/1534937369337597957kgalus
2022-06-09 16:40:26Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/ilKtO1Van4 https://twitter.com/i/web/status/1534938376498925570carloyolax
2022-06-09 16:33:11Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/j06C7S0YdI https://twitter.com/i/web/status/1534934853149511680SphereIS360
2022-06-09 16:32:48Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/csgozJZWrW https://twitter.com/i/web/status/1534935356096843779TalleyBilly
2022-06-09 16:31:28Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/VZQB3jRhzI https://twitter.com/i/web/status/1534935607897636865SecureERP
2022-06-09 16:21:09Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/F5m1WL2wU1 https://twitter.com/i/web/status/1534932336839630854elev8tech
2022-06-09 16:20:47Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/iKz7holm55 https://twitter.com/i/web/status/1534933091134873602OmniBSolutions
2022-06-09 16:15:30#CyberSecurity #الامن_السيبراني يحاول TA570 Qakbot (Qbot) استغلال CVE-2022-30190 (Follina) (ms-msdt)، (الخميس، 9 يونيو)digitalskillsA
2022-06-09 16:12:34Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/lEEnWFXu8p https://twitter.com/i/web/status/1534930071097589760khronostelecom
2022-06-09 16:11:18Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/naQj8oJWKo https://twitter.com/i/web/status/1534925794069434368e_computech
2022-06-09 16:10:54Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/i4VN7XrdN1 https://twitter.com/i/web/status/1534926044649635841smbgurus
2022-06-09 16:10:29Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/byT8Kr7GbI https://twitter.com/i/web/status/1534930826361720834SydowIS
2022-06-09 16:08:42Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/2S84xCMLld https://twitter.com/i/web/status/1534926547982884864SecurityVal
2022-06-09 16:03:21Windows: BSI sieht erhöhte Warnstufe für Sicherheitslücke CVE-2022-30190 als notwendig an - WindowsUnited https://t.co/RT922bmIo0 https://windowsunited.de/windows-bsi-sieht-erhoehte-warnstufe-fuer-sicherheitsluecke-cve-2022-30190-als-notwendig-an/itlantikde
2022-06-09 16:00:52Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/fllhbquTmQ https://twitter.com/i/web/status/1534928069240279041NowTechSolution
2022-06-09 16:00:25Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/Vyp2RfSJ4O https://twitter.com/i/web/status/1534928313453621249amsinetworks
2022-06-09 15:55:41Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/Ip4SkoQX5K https://twitter.com/i/web/status/1534924282538729472SeamlessAdvSolu
2022-06-09 15:46:04Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/TpxyotpJrP https://twitter.com/i/web/status/1534921012046880770Regem_ITS
2022-06-09 15:44:39Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/jgUWhVX2nX https://twitter.com/i/web/status/1534921263319330822o_integradas
2022-06-09 15:40:27Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/MhsdwJVoqt https://twitter.com/i/web/status/1534923024750759936somosintegratec
2022-06-09 15:37:55Microsoft reconheceu a vulnerabilidade (CVE-2022-30190) no final do mês passado, mas ainda não entregou um patch… https://t.co/MKYjAHCSKh https://twitter.com/i/web/status/1534918357975040000BotDeschamps
2022-06-09 15:33:52Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/hKxQV59EKE https://twitter.com/i/web/status/1534918746254495745Michael_StJohn
2022-06-09 15:33:32Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/ZCDipCuHrz https://twitter.com/i/web/status/1534918749077311489Innov8tv
2022-06-09 15:33:10Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/8hciswEaiw https://twitter.com/i/web/status/15349187531584143361Opsec2
2022-06-09 15:32:49Analysis of MSDT RCE Code Injection Vulnerability(CVE-2022-30190) https://t.co/sgJLsKpMRS https://paper.seebug.org/1914/0xbadad
2022-06-09 15:31:11Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/gRrsXcxxHz https://twitter.com/i/web/status/1534920508562722818smbgurus
2022-06-09 15:30:49Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/P0fILgrRjv https://twitter.com/i/web/status/1534920512580771842jorpnes
2022-06-09 15:20:20Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/mZgumFOOFR https://twitter.com/i/web/status/1534917740150116352ArrakisConsult
2022-06-09 15:18:28Die neue Schwachstelle CVE-2022-30190, auch #Follina genannt, ermöglicht den Exploit des Windows Support Diagnostic… https://t.co/ZWAfT65Zlz https://twitter.com/i/web/status/1534913228622413827Kaspersky_DACH
2022-06-09 15:18:07CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-09 15:14:21Windows: BSI sieht erhöhte Warnstufe für Sicherheitslücke CVE-2022-30190 als notwendig an https://t.co/3ElAn1WxEt https://windowsunited.de/windows-bsi-sieht-erhoehte-warnstufe-fuer-sicherheitsluecke-cve-2022-30190-als-notwendig-an/?feed_id=4987&_unique_id=62a20b7961259WindowsUtd
2022-06-09 15:10:43Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/BerQ4nLDed https://twitter.com/i/web/status/1534915726720524292CyberSecManaged
2022-06-09 15:10:21Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/QCIQ3kNQWZ https://twitter.com/i/web/status/1534915730159935489trinitynetworx
2022-06-09 15:04:24Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/qUVrORgn3g https://twitter.com/i/web/status/1534911197060993024gatanasio_71
2022-06-09 15:02:06Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/dKK2xEwDLP https://twitter.com/i/web/status/1534912204423700482BornConsultants
2022-06-09 15:01:44Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/1LZog96cJy https://twitter.com/i/web/status/1534912454899257352Fzimmerb
2022-06-09 15:00:50Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/lnFM388NSy https://twitter.com/i/web/status/1534912707278807042jesuscajero
2022-06-09 15:00:37Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/f3HaZ3m6TG https://twitter.com/i/web/status/1534912958924562432CanteraIT
2022-06-09 14:56:05Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/KeirQCYh7O https://twitter.com/i/web/status/1534908428287614978andmacsil
2022-06-09 14:52:19Microsoft Guidance for Follina: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability… https://t.co/eNY3arH33M https://twitter.com/i/web/status/1534909001229549568ChiNetworks
2022-06-09 14:30:48Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/x62SnIn3Ea https://twitter.com/i/web/status/1534904152970739714Boylesinfosys
2022-06-09 14:30:37Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/VQZwCNsiUn https://twitter.com/i/web/status/1534904654223806465FortiOne_IT
2022-06-09 14:00:30Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/YRRupCS1FM https://twitter.com/i/web/status/1534897104644104198NorcomSolutions
2022-06-09 14:00:09Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/nsIRS8HyAk https://twitter.com/i/web/status/1534898113864994817ratech_services
2022-06-09 13:52:05Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/ZfdYb8a1FO https://twitter.com/i/web/status/1534893832524947458bbserviceskv
2022-06-09 13:50:30TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt), (Thu, Jun 9th) https://t.co/PVQTOez1zG https://isc.sans.edu/diary/rss/28728L4rryC4rson
2022-06-09 13:40:09TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt) https://t.co/CwsFzO2UlB #infosec #secinfo… https://t.co/d1YHB6avfK https://isc.sans.edu/forums/diary/TA570+Qakbot+Qbot+tries+CVE202230190+Follina+exploit+msmsdt/28728/ https://twitter.com/i/web/status/1534891242047389698CeptBiro
2022-06-09 13:30:10Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/SHhJkUoYra https://twitter.com/i/web/status/1534889302450110467MarcioLoboM1
2022-06-09 13:25:55Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/svpT5Z8EOl https://twitter.com/i/web/status/1534886744138649601safedeny
2022-06-09 13:23:14TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt) https://t.co/EXlypLorcw #infosec #secinfo… https://t.co/ROirEj1aD2 https://isc.sans.edu/forums/diary/TA570+Qakbot+Qbot+tries+CVE202230190+Follina+exploit+msmsdt/28728/ https://twitter.com/i/web/status/1534887156669460486ReneRobichaud
2022-06-09 13:11:04#follina Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/Ld6XDgU5Bj https://youtu.be/dGCOhORNKRkN3UR4LL00P
2022-06-09 13:00:30Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 1.3M (audience size) CVE-2022-26937: 341.5K CVE-2022-2… https://t.co/fd6KEYk0aa https://twitter.com/i/web/status/1534883018221010944CVEtrends
2022-06-09 12:54:10Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/qyhDlN7FN7 https://twitter.com/i/web/status/1534878984483250177SolventTechGh
2022-06-09 12:51:49Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/aAHMwe34uT https://twitter.com/i/web/status/1534879991204397059TisecI
2022-06-09 12:51:07TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt), (Thu, Jun 9th) - https://t.co/V5q7FTef6W https://isc.sans.edu/diary/rss/28728ka0com
2022-06-09 12:20:26TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt), (Thu, Jun 9th) https://t.co/J1uRcQKBEk https://isc.sans.edu/diary/rss/28728cybsecbot
2022-06-09 11:41:03Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/3mXZjny5Ji https://twitter.com/i/web/status/1534861872498876417actisoft_tech
2022-06-09 11:21:05New post from https://t.co/uXvPWJy6tj (TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt), (Thu,… https://t.co/1Ivgpjeo7Y http://www.sesin.at https://twitter.com/i/web/status/1534855430576414721WolfgangSesin
2022-06-09 11:20:51New post from https://t.co/9KYxtdZjkl (TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt), (Thu,… https://t.co/pV4MgopeBz http://www.sesin.at https://twitter.com/i/web/status/1534855443129958405www_sesin_at
2022-06-09 11:10:28Windows Vulnerability Follina (CVE-2022-30190): New findings, new risks (June 9, 2022) https://t.co/7nWEpfto0Z… https://t.co/HA2mVxHdLW https://borncity.com/win/?p=24809 https://twitter.com/i/web/status/1534853279280156673etguenni
2022-06-09 10:30:25Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/NNOVjPkV3I https://twitter.com/i/web/status/1534843756624629762stinnerIT
2022-06-09 10:20:23Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/JD9kjxyzAd https://twitter.com/i/web/status/1534839475477553152FrikEnTwit
2022-06-09 10:20:21No patch yet ? Follina (CVE-2022-30190) or the remote code execution vulnerability discovered that will abuse the… https://t.co/LCXivMoiuD https://twitter.com/i/web/status/1534839476257705984Kaavs
2022-06-09 10:20:14Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/KQ863iw8JE https://twitter.com/i/web/status/1534840481821106181agrisols
2022-06-09 10:20:12Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/EDEi2eWYgk https://twitter.com/i/web/status/1534840484899786753OptimisingIT
2022-06-09 10:00:33Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/vqmgTGhhso https://twitter.com/i/web/status/1534837717300875267Acenetworkscy
2022-06-09 09:52:01Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/GWmiZ4Gq1l https://twitter.com/i/web/status/1534833685891006467MicheleCiacci
2022-06-09 09:10:46Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/i7dVoXvsbU https://twitter.com/i/web/status/1534823871383228416iitcoman
2022-06-09 08:42:12La nuova vulnerabilità CVE-2022-30190, nota come Follina, consente di sfruttare il #Windows Support Diagnostic Tool… https://t.co/Ca21zTOQQh https://twitter.com/i/web/status/1534815072576589824KasperskyLabIT
2022-06-09 08:40:49Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/V6H6qiURhS https://twitter.com/i/web/status/1534816573122400256comztech
2022-06-09 08:30:28Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/98zbJgNXtK https://twitter.com/i/web/status/1534814561123065856iitcoman
2022-06-09 08:15:18Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/nnlWrSoWsE https://twitter.com/i/web/status/1534808023981510657ibseleven
2022-06-09 08:11:00Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/CI7IYsVm58 https://twitter.com/i/web/status/1534809024985714688INStream10
2022-06-09 08:00:55Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/Lq7q1Pl9ev https://twitter.com/i/web/status/1534806759646404608TechExDigitals
2022-06-09 08:00:34TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) #infosec #infosecurity #cybersecurity #threatintel… https://t.co/Z7GdEsLieA https://twitter.com/i/web/status/1534806797986451461CyberIQs_
2022-06-09 07:59:07TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt) https://t.co/f0CutpBkEA via @SANS_ISC https://isc.sans.edu/forums/diary/28728ubusa_
2022-06-09 07:50:37Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/zNhhzgyEaW https://twitter.com/i/web/status/1534802485717639168ConceptCareTech
2022-06-09 07:43:35TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt) https://t.co/f0CutpBkEA via @SANS_ISC https://isc.sans.edu/forums/diary/28728ubusa_
2022-06-09 07:40:22Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/7gmNNUMzNf https://twitter.com/i/web/status/1534801729908350976CarerraHoldings
2022-06-09 07:40:08Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/HboszbIqNp https://twitter.com/i/web/status/1534802482060222466IntriousTech
2022-06-09 07:20:54Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/ldCSOJVGke https://twitter.com/i/web/status/1534794938717700096Trust3Security
2022-06-09 07:20:42Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/oLyQMHD06w https://twitter.com/i/web/status/1534795697450627075DataAnalist1
2022-06-09 07:11:27Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/6UcyLo78K5 https://twitter.com/i/web/status/1534791660323975168TechnologiesZm
2022-06-09 07:10:58Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/thDC7p15QI https://twitter.com/i/web/status/1534793617256206338ConceptCareTech
2022-06-09 07:10:57Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/cEFaT8ohSp https://twitter.com/i/web/status/1534793929744338946nimedeux
2022-06-09 06:51:15Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/1eQDLvoInN https://twitter.com/i/web/status/1534789395525603331FnCybersecurity
2022-06-09 06:50:36Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/UPxUBjLOL4 https://twitter.com/i/web/status/1534789898502299649MBITJapan
2022-06-09 06:44:40Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/1StSWhuhEQ https://twitter.com/i/web/status/1534785620375130112shanil_daya
2022-06-09 06:32:02Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/5ud1NAu2AQ https://twitter.com/i/web/status/1534783355325239297everbextec
2022-06-09 06:31:15Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/vvqYj4IvMi https://twitter.com/i/web/status/1534783606874427392AVFZC
2022-06-09 06:22:18TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt), (Thu, Jun 9th) https://t.co/kEL2EANmw0… https://t.co/0C47vORStb http://news.poseidon-us.com/SRsswC https://twitter.com/i/web/status/1534780720450637825PoseidonTPA
2022-06-09 06:17:57🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2022-30190: https://t.co/TnvYA2buzC 👉 CVE-2022-3019… https://t.co/1gDORfudfN https://github.com/joshuavanderpoll/CVE-2022-30190 https://twitter.com/i/web/status/1534778386354253825Prohacktiv3
2022-06-09 06:12:15#ln -s :malware_traffic: RT @sans_isc: ISC Diary: @malware_traffic reviews #TA570 #CVE-2022-30190 (#Follina) exploi… https://t.co/9bnOkfGF74 https://twitter.com/i/web/status/1534779248048734208cpardue09
2022-06-09 06:03:07ISC Diary: @malware_traffic reviews #TA570 #CVE-2022-30190 (#Follina) exploit (ms-msdt) for #Qakbot… https://t.co/jHs0ekjSH3 https://twitter.com/i/web/status/1534775005459976192sans_isc
2022-06-09 06:00:42Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/k1zaPn2jAH https://twitter.com/i/web/status/1534776308265365504LtdNamaste
2022-06-09 05:31:00Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/4B1vRiOTV1 https://twitter.com/i/web/status/1534767751532793858digitrackspl
2022-06-09 05:20:35Windows又有新零時差漏洞DogWalk https://t.co/gnyBl0D7VK 微軟5月底爆發編號CVE-2022-30190的微軟支援診斷工具(Microsoft Support Diagnostic Tool,M… https://t.co/tB4dU5sL5K https://www.ithome.com.tw/news/151354 https://twitter.com/i/web/status/1534766273959460865M157q_News_RSS
2022-06-09 05:00:17P0c Patch / Fix 0day CVE-2022-30190 follina - How to undo workarounds , To Disable the MSDT URL Protocol https://t.co/L3fOpUmlx6kittendusty
2022-06-09 04:53:35Technical Tip: Find out how #Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina' Microsoft Office protocol… https://t.co/9FMSHf0qd2 https://twitter.com/i/web/status/1534757685178114048MYBintara
2022-06-09 04:30:10The latest #Bitdefender Threat Debrief is out! Highlight of the Month: CVE-2022-30190 Zero-Day Vulnerability called… https://t.co/5iWwPTAQOY https://twitter.com/i/web/status/1534752406436651010ipsystemsPH
2022-06-09 03:40:30💥FIX MSDT Vulnerability CVE-2022-30190 ➡️Manual FIX to MSDT Vulnerability ➡️Intune Settings Catalog FIX ➡️Group Pol… https://t.co/agkkOtZLut https://twitter.com/i/web/status/1534731889692446720ManageDevices
2022-06-09 00:20:20Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される | トレンドマイクロ セキュリティブログ - https://t.co/PjTt5hIYRS https://go.shr.lc/3zjkpIv__4wkn
2022-06-08 23:50:51Follina Vulnerability – CVE-2022-30190 #Cybersecurity #security via https://t.co/olBiC9iZIh https://t.co/fIziYCyLjK http://twinybots.ch https://securityboulevard.com/2022/06/follina-vulnerability-cve-2022-30190/MnkeniFrancis
2022-06-08 23:13:57Follina-Schwachstelle (CVE-2022-30190): Neue Erkenntnisse, neue Risiken https://t.co/WIGTFFUUm1 #Sicherheit… https://t.co/pG8vjsPMzq https://www.borncity.com/blog/2022/06/09/follina-schwachstelle-cve-2022-30190-neue-erkenntnisse-neue-risiken/ https://twitter.com/i/web/status/1534672968252628998etguenni
2022-06-08 21:50:19Here’s what we know about why CVE-2022-30190 “Follina” is so powerful, how it works, and Microsoft’s workaround. https://t.co/PhYMXNZDV5 https://bit.ly/3xiNvFjLiveActionIT
2022-06-08 19:50:06CVE-2022-30190:Microsoft Windows 支持诊断工具 (MSDT) 远程代码执行漏洞利用分析 https://t.co/1pTPUGT1y5 https://t.co/H7C3rs9kt6 https://ift.tt/b4hw9Cf https://ift.tt/vuehNcmbuaqbot
2022-06-08 17:30:18CVE-2022-30190. Разбор MSDT уязвимости Приветствую, Codeby! В этой статье мы разберем как работает CVE-2022-30190… https://t.co/J2kdsLdzIT https://twitter.com/i/web/status/1534585319357562886IT_news_for_all
2022-06-08 17:30:15Attention Windows users! There's a new critical remote code execution vulnerability called CVE-2022-30190 that's af… https://t.co/rvARfioul0 https://twitter.com/i/web/status/1534586857580904453shultz_jackie
2022-06-08 16:30:34In diesem Video zeige ich dir, wie du den Workaround von #Microsoft zum aktuellen #Follina #Exploit (CVE-2022-30190… https://t.co/isLW3SQbLK https://twitter.com/i/web/status/1534573468368351232florian_dalwigk
2022-06-08 15:44:40Follina CVE-2022-30190 https://t.co/thUrUQmroD をチラ見してパッチ出たのかと思ってそっ閉じしてたのですが、良く見たら影響を受ける Windows バージョンの一覧なだけでパッチは提供さ… https://t.co/DktPBrAaUh https://msrc.microsoft.com/update-guide/ja-JP/vulnerability/CVE-2022-30190 https://twitter.com/i/web/status/15345585543463690240x009AD6_810
2022-06-08 15:43:20Just tried @_JohnHammond’s CVE-2022-30190 recreation and I’ve got to say that it’s really really well done and easy to use :) thx johnfucobell
2022-06-08 15:40:25THREAT SYNOPSIS Follina Vulnerability – CVE-2022-30190 - Security Boulevard https://t.co/ZXCRDJQk77 via… https://t.co/bq0nlaXQln https://securityboulevard.com/2022/06/follina-vulnerability-cve-2022-30190/ https://twitter.com/i/web/status/1534560803109707779ChiNetworks
2022-06-08 15:25:24CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-08 14:30:19[New Post] 💥FIX MSDT Vulnerability CVE-2022-30190 ➡️Manual FIX to MSDT Vulnerability ➡️Intune Settings Catalog FIX… https://t.co/6fd40LcLCF https://twitter.com/i/web/status/1534543269169872896ManageDevices
2022-06-08 13:33:26https://t.co/88yH1dEVDB Follina Vulnerability – CVE-2022-30190 #cybersecurity https://securityboulevard.com/2022/06/follina-vulnerability-cve-2022-30190/netsecu
2022-06-08 13:22:59Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 2.4M (audience size) CVE-2022-26134: 939.1K CVE-2022-3… https://t.co/mDbzub8WJP https://twitter.com/i/web/status/1534520631835885571CVEtrends
2022-06-08 13:22:46Security Warning: Windows. Once a recipient opens the attached file, malicious attachments utilise CVE-2022-30190… https://t.co/FHQjfkJ71h https://twitter.com/i/web/status/1534524675342143488Renegade105
2022-06-08 13:00:50CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/N0iIoArDBx https://t.co/kowCLTexoZ http://dlvr.it/SRqcVWThomasGarreau95
2022-06-08 12:41:11Follina Vulnerability – CVE-2022-30190 https://t.co/KFLgSiTtgF https://securityboulevard.com/2022/06/follina-vulnerability-cve-2022-30190/security_inside
2022-06-08 12:31:19Follina Vulnerability – CVE-2022-30190: Follina (CVE-2022-30190) or the remote code execution vulnerability discove… https://t.co/7GrPgqN1XI https://twitter.com/i/web/status/1534512595423481863cipherstorm
2022-06-08 12:18:08Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/igZ8g2TjyO https://twitter.com/i/web/status/1534505727288610818SDCarter10
2022-06-08 12:17:55Boutta exploit CVE-2022-30190 bc why not hehehehehehehehehehfucobell
2022-06-08 10:40:34CVE-2022-30190-follina-Office-MSDT-Fixed - CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。 https://t.co/Yv6qRmoGk9 http://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixedpythontrending
2022-06-08 10:21:43Новая уязвимость Windows | Полный доступ к системе | CVE-2022-30190 ❓> На прошлой неделе была обнаружена новая уяз… https://t.co/RZzg66v46o https://twitter.com/i/web/status/1534475401313017857IT_news_for_all
2022-06-08 09:49:07An unpatched vulnerability tracked has been tracked as CVE-2022-30190 (aka Follina). TA413, a Chinese state-sponsor… https://t.co/69jKV4hk6K https://twitter.com/i/web/status/1534467980561723394CswWorks
2022-06-08 09:47:48CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) #infosec #infosecurity #cybersecurity #threatintel… https://t.co/buol0zIfTQ https://twitter.com/i/web/status/1534469078391435264CyberIQs_
2022-06-08 09:43:21La nuova vulnerabilità CVE-2022-30190, nota come Follina, consente di sfruttare il #Windows Support Diagnostic Tool… https://t.co/oSn34xOk7x https://twitter.com/i/web/status/1534469266329808897KasperskyLabIT
2022-06-08 09:37:56💥FIX MSDT Vulnerability CVE-2022-30190 ➡️Manual FIX to MSDT Vulnerability ➡️Intune Settings Catalog FIX ➡️Group Pol… https://t.co/TyuZZRHd8B https://twitter.com/i/web/status/1534460229831692288anoopmannur
2022-06-08 09:25:54💥FIX MSDT Vulnerability CVE-2022-30190 ➡️Manual FIX to MSDT Vulnerability ➡️Intune Settings Catalog FIX ➡️Group Pol… https://t.co/TyuZZRHd8B https://twitter.com/i/web/status/1534460229831692288anoopmannur
2022-06-08 09:21:27@CisoDiagonal trying to sort some stupid reg export for the CVE-2022-30190 issue.smoon_lee
2022-06-08 08:53:58#Qakbot - AA - #CVE-2022-30190 docx shared by @k3dg3 🔥 als-online.]org/JQWj78/Y.png rundll32.exe C:\Windows\syst… https://t.co/LPP56RwH2y https://twitter.com/i/web/status/1534455891730350080pr0xylife
2022-06-08 08:01:18Zero-day, zero-click Microsoft Windows Support Diagnostic Tool remote code execution vulnerability (CVE-2022-30190)… https://t.co/yrL4eF0ykN https://twitter.com/i/web/status/1534443841297727489MarkoGulan
2022-06-08 07:11:10Vulnerability alert! CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/yc1NTChbFO #CyberSecurity https://securelist.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/106703/balbonipaolo
2022-06-08 07:10:55#Follina CVE-2022-30190 https://t.co/kCdGLGMPtKrealcyberpanda
2022-06-08 05:01:12#Follina CVE-2022-30190 Email: WORK AFTER CLASSES OFFER (00 WEEKLY SALARY) Basic_Personal_Data_Information_Form.rtf… https://t.co/P3UmTVrxCO https://twitter.com/i/web/status/1534399316022169601StopMalvertisin
2022-06-08 04:11:09#Follina CVE-2022-30190 https://t.co/1f9IsmBe2P First seen: 2022-06-06 Filename: aaaaaa.rtf URL: http://158.255.2.2… https://t.co/pbHjqslA3E https://www.virustotal.com/gui/file/038276cb9c77684c17b7ed8d473874afb7f432d4755e9f3f7b6e1379b93ab55c/detection https://twitter.com/i/web/status/1534383820400914432StopMalvertisin
2022-06-08 02:20:22トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を呼びかけ | ScanNetSecurity https://t.co/oSJ2ROQvTE https://scan.netsecurity.ne.jp/article/2022/06/08/47701.htmlohhara_shiojiri
2022-06-08 02:00:25Liked on YouTube: Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/9D3OShgpKW https://www.youtube.com/watch?v=dGCOhORNKRkjasmeralia
2022-06-08 01:50:29トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を呼びかけ https://t.co/aZiNy1nhwA https://gunosy.com/articles/eL3M0?s=tcl7U4SDmtV3cPMA
2022-06-08 01:40:46CVE-2022-30190 and the City of Thousand solutions https://t.co/ZaY9mhDXar https://t.co/n1NwC4gQI1 https://techdailychronicle.com/?p=179212&utm_source=twitter&utm_medium=social&utm_campaign=ReviveOldPost_techchronicle
2022-06-08 00:38:09トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を ... https://t.co/unAnX2yuyF https://t.co/5Fmqpw4LZn http://izumino.jp/Security/sec_trend.cgi?ref=tw&ref_date=2022-06-08%2009%3A20 https://scan.netsecurity.ne.jp/article/2022/06/08/47701.htmlsec_trend
2022-06-08 00:36:50トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を呼びかけ https://t.co/mA3gQb6gVo https://scan.netsecurity.ne.jp/article/2022/06/08/47701.htmlitit7777
2022-06-08 00:35:57MSDTの件:トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を呼びかけ | ScanNetSecurity https://t.co/T7ZmovtPWk https://itnews.org/news_resources/318996tamosan
2022-06-08 00:14:06Analysis of MSDT Code Injection Vulnerability(CVE-2022-30190) https://t.co/XhMoHKtush https://paper.seebug.org/1914/MathWebEntry
2022-06-08 00:10:22As observed by Proofpoint, the DOCX is exploiting CVE-2022-30190/Follina: https://t.co/icNFlyVT7M https://twitter.com/threatinsight/status/1534227619222196224phage_nz
2022-06-07 23:22:12トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を呼びかけ https://t.co/KubqyXd6Rn https://t.co/CGQfU2TdFN http://dlvr.it/SRnr79TokyoSec
2022-06-07 23:12:35トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を呼びかけ https://t.co/UE5W6kR6RV https://scan.netsecurity.ne.jp/article/2022/06/08/47701.htmlScanNetSecurity
2022-06-07 23:10:26トレンドマイクロ、Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」に注意を呼びかけ https://t.co/gPCqWSBnl1 https://ift.tt/xUcFeNpitsecalert
2022-06-07 21:32:42پشمااام این هنوز کار میکنه =))) توجه دوستان علاقه‌مند رو به CVE-2022-30190 جلب میکنمA_Jamadi
2022-06-07 21:17:24.@FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The… https://t.co/79zGk4FAtu https://twitter.com/i/web/status/1534279554122059776SDCarter10
2022-06-07 21:05:20“…Finally, last Tuesday, Microsoft declared the behavior a vulnerability, giving it the tracker CVE-2022-30190 and… https://t.co/pyKZKhFVjH https://twitter.com/i/web/status/1534277409561669632drexdeford
2022-06-07 20:20:19@malwaretech Microsoft Office #Exploit "Follina" (CVE-2022-30190) Explained https://t.co/vHPq5ubnBI https://lnkd.in/gXxCSZ8mlgomezperu
2022-06-07 20:13:15#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/uQTX6ym8vn https://twitter.com/i/web/status/1534264552388452353KadimaConsult
2022-06-07 20:13:00#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/dq3ikHIBTb https://twitter.com/i/web/status/1534264557136404482MarcFarron
2022-06-07 20:03:13#infosec how are you deploying the workaround enmasse for #Follina CVE-2022-30190? Editing the reg on one machine… https://t.co/gwODG2NIM3 https://twitter.com/i/web/status/1534262587885506561aaron_s_moffett
2022-06-07 19:24:13[New Post] 💥FIX MSDT Vulnerability CVE-2022-30190 ➡️Manual FIX to MSDT Vulnerability ➡️Intune Settings Catalog FIX… https://t.co/9jcXHf3ejg https://twitter.com/i/web/status/1534251643004682240anoopmannur
2022-06-07 19:22:41[New Post] 💥FIX MSDT Vulnerability CVE-2022-30190 ➡️Manual FIX to MSDT Vulnerability ➡️Intune Settings Catalog FIX… https://t.co/12fyfClq3p https://twitter.com/i/web/status/1534252005786472448ManageDevices
2022-06-07 19:13:38#0day #Microsoft Office Word MSDTJS Code Execution #Exploit #MicrosoftOffice #RCE #CVE-2022-30190 https://t.co/qzXDeZJOM6 https://0day.today/exploit/description/37779inj3ct0r
2022-06-07 18:44:21Microsoft Office Exploit "Follina" (CVE-2022-30190) Explained https://t.co/hy9aZEA4Ym https://t.co/yXczxCAMKG https://www.tiktok.com/t/ZTdcWsb3S/malwaretech
2022-06-07 17:40:58Proofpoint saw #TA570 exploiting CVE-2022-30190 to deliver #Qbot malware. Actor uses thread hijacked messages with… https://t.co/SiMzR3q3XF https://twitter.com/i/web/status/1534227444915482625threatinsight
2022-06-07 17:22:04#Follina Fun CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability… https://t.co/vAlX0KD3Yk https://twitter.com/i/web/status/1534221323689418752Crypt0Trader
2022-06-07 17:10:21Bitdefender Threat Debrief | June 2022 edition was just released! The highlight of this month is CVE-2022-30190 (Fo… https://t.co/AgT0gyLUGO https://twitter.com/i/web/status/1534220657960968197MartinZugec
2022-06-07 17:10:11#Qakbot Infection #CVE-2022-30190 #Follina 🚨 #MalDoc name pattern: doc[0-9]{3}\.docx More payloads:… https://t.co/LmSjbxlh8X https://twitter.com/i/web/status/1534220832242819072Max_Mal_
2022-06-07 16:50:17La campagne de phishing utilisait des fichiers RTF pour exploiter la faille Follina CVE-2022-30190. Un script Power… https://t.co/z3EFf9MKl5 https://twitter.com/i/web/status/1534214461501882370cert_ist
2022-06-07 16:50:15#Follina (CVE-2022-30190) also triggers in the Foxit PDF Reader Researcher -> @j00sean https://t.co/jg8EpazFjp #0day https://www.cyberkendra.com/2022/06/microsoft-follina-bug-also-affects-pdf.htmlJRG_Testa
2022-06-07 16:40:26#Qakbot - obama186 - #CVE-2022-30190 [+] .html > .zip > .img > .lnk > .dll rundll32.exe 019338921.dll,DllInstall… https://t.co/zhExwgM5wU https://twitter.com/i/web/status/1534212345341288455pr0xylife
2022-06-07 16:20:14#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/0XzWHXZEV8 https://twitter.com/i/web/status/1534206885389291526ICSGetsIT
2022-06-07 15:10:42CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-07 14:50:33Note: this vulnerability is not the same as Follina / CVE-2022-30190, but a 2+ years old "forgotten" issue in Micro… https://t.co/KTubZRpWPB https://twitter.com/i/web/status/15341837419496325190patch
2022-06-07 14:40:34@_Saraque حاليا MSDT Follina اخطر CVE-2022-30190 يعنى تخيلى حتة ملف Word ملوش لزمه على الجهاز ومحدش حاسس بوجوده بيت… https://t.co/NEckRHq5Bs https://twitter.com/i/web/status/1534181980132212737Mohamed87Khayat
2022-06-07 14:20:21Wild! is this #CVE-2022-30190 #Follina I see?k3dg3
2022-06-07 14:00:27Sending malware - #Follina CVE-2022-30190 - 45.77.156.179 - 141.105.65.149 #CVE #Exploit #CyberSecurity… https://t.co/dNDx1Mq3ae https://twitter.com/i/web/status/1534172689811767297migueljmnez
2022-06-07 13:50:12#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/VumUy94Tjv https://twitter.com/i/web/status/1534169564090716160ratech_services
2022-06-07 13:10:33Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-26134: 1.8M (audience size) CVE-2022-30190: 378.6K CVE-2022-3… https://t.co/ah5mq2r3Rx https://twitter.com/i/web/status/1534158241801830401CVEtrends
2022-06-07 11:40:26Die neue Schwachstelle CVE-2022-30190, auch #Follina genannt, ermöglicht den Exploit des Windows Support Diagnostic… https://t.co/zaMfquhNR3 https://twitter.com/i/web/status/1534135603574497280Kaspersky_DACH
2022-06-07 11:05:08Follina (CVE-2022-30190): No major attack wave, but campaigns on EU/US and other targets https://t.co/yh0luHX0X2… https://t.co/XrnIHwhyxx https://borncity.com/win/?p=24793 https://twitter.com/i/web/status/1534125860239859713etguenni
2022-06-07 10:40:44The remote code execution flaw, summarized in bulletin CVE-2022-30190, deals with a URL protocol issue. The company… https://t.co/WJEdYjENWR https://twitter.com/i/web/status/1534122998885761024efectro
2022-06-07 10:20:47Follina (CVE-2022-30190): Große Angriffswelle ausgeblieben, aber Warnungen vor Kampagnen auf EU/US-Ziele… https://t.co/WajtsPqncb https://twitter.com/i/web/status/1534117323845558272etguenni
2022-06-07 10:10:40Tonight while testing PDF Readers, i found a way to trigger CVE-2022-30190 aka #Follina bug in Foxit PDF Reader. Th… https://t.co/G7Ss8AdAOp https://twitter.com/i/web/status/1534115332830507008j00sean
2022-06-07 09:33:00Analysis of MSDT Code Injection Vulnerability(CVE-2022-30190) https://t.co/kz3pQ1uJ0k https://t.co/73d2lwbK6r https://ift.tt/lPzNqwm https://ift.tt/79IifLAbuaqbot
2022-06-07 08:51:40Analysis of MSDT Code Injection Vulnerability(CVE-2022-30190) by HuanGMz of Knownsec 404 Team… https://t.co/xsUGxTgQIo https://twitter.com/i/web/status/1534093555911692289seebug_team
2022-06-07 07:14:06Aplicando workaround al problema con el protocolo ms-msdt (aka "Follina") en el CVE-2022-30190. Dejo por aquí el c… https://t.co/6UN56tLqXh https://twitter.com/i/web/status/1534068000759894016manelrodero
2022-06-07 06:30:06"CVE-2022-30190 MSDT PowerShell Code Injection Vulnerability Analysis" https://t.co/ViRj51xWLf (Chinese) by HuanGMz… https://t.co/UvxQX6XARH https://paper.seebug.org/1913/ https://twitter.com/i/web/status/153406006186928537780vul
2022-06-07 06:20:33FAQ追加しています。 さまざまな情報が散見されますが、 改めて公式情報のご確認をどうぞよろしくお願いします CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス https://t.co/jLqPiUhKc7 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/EurekaBerry
2022-06-07 06:10:26CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction - https://t.co/JiW2bhL9Rb #OSINT #Security #Threatintel https://www.redpacketsecurity.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/RedPacketSec
2022-06-07 04:34:14CVE-2022-30190 MSDT 代码注入漏洞分析 https://t.co/PTuHRWnPwh https://t.co/QaQKLjxerq https://ift.tt/AuFcbZH https://ift.tt/ExJKZuVbuaqbot
2022-06-07 03:23:55CVE-2022-30190 MSDT 代码注入漏洞分析 https://t.co/JuO6y4rz2R https://t.co/dMzwPiH57K https://ift.tt/BO6TiJk https://ift.tt/RF4JxCgbuaqbot
2022-06-07 02:11:34【Windows】マイクロソフトサポート診断ツール(MSDT)の脆弱性に対する回避策[CVE-2022-30190]※2022年5月30日発行 https://t.co/i8MGPdOWW1 https://bizlog.tech/windows-vulnerability-cve-2022-30190/bizlog_tech
2022-06-07 00:40:30Latest version of CVE-2022-30190 and Mesdetty malware being converted into some hard trance via #Techtronica. Enjo… https://t.co/NErCv4pxTr https://twitter.com/i/web/status/1533970580696797185Laughing_Mantis
2022-06-07 00:11:31#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/bM4XZxqhRC https://twitter.com/i/web/status/1533963201158709248ICT_NETWORK_SYS
2022-06-06 23:45:50#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/Te4QipgfCf https://twitter.com/i/web/status/1533954646749978626itblueprint
2022-06-06 23:40:13CVE-2022-30190 (https://t.co/hFvzOt0bnJ) вообще очень стрёмная если разобраться. Лучще всем прямо сеёчас срочно отк… https://t.co/S6aL8oH1io https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ https://twitter.com/i/web/status/1533956495376797696Mike82137849
2022-06-06 23:31:01#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/ib86cp3Cnu https://twitter.com/i/web/status/1533952380835975168Edge_worx
2022-06-06 23:30:50High Vulnerabilities は Windows Server 2012 における MSDT の RCE 脆弱性(CVE-2022-30190)のみ。 因みに、Windows Server 2012 のサポート期限は2… https://t.co/meq1adtvgT https://twitter.com/i/web/status/1533953573486469120MasaKAMAYAMA
2022-06-06 23:20:46#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/63TS7h9aCE https://twitter.com/i/web/status/1533950870571851777hytekcomputers
2022-06-06 22:41:26#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/KjjnXXCLyF https://twitter.com/i/web/status/1533939545804259330itblueprint
2022-06-06 22:41:21Micropatches for this additional 0day in MSDT (not to be confused with Follina / CVE-2022-30190) are scheduled to b… https://t.co/AasAPMG1qd https://twitter.com/i/web/status/15339396698131496960patch
2022-06-06 22:20:37As observed on May 30 by Proofpoint security researchers, APT group TA413 is now using CVE-2022-30190 exploits to e… https://t.co/fCz6IVITJ1 https://twitter.com/i/web/status/1533932016978337795HoomanMinai
2022-06-06 22:20:35#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/AblLslBZy4 https://twitter.com/i/web/status/1533932249590206465hutton647
2022-06-06 21:24:40#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/6eVqLOyXtL https://twitter.com/i/web/status/1533919413069664257mgari78
2022-06-06 21:22:42#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/IXeiOAAAen https://twitter.com/i/web/status/1533917147600195590barryfein
2022-06-06 21:10:28#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/8WbRe1rlL0 https://twitter.com/i/web/status/1533919161327489024jesuscajero
2022-06-06 21:05:31#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/I7mjNKPEeh https://twitter.com/i/web/status/1533914379363704837jdpatfield
2022-06-06 21:04:44#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/qsu1VtMsfG https://twitter.com/i/web/status/1533914883862978562stigroup
2022-06-06 20:53:01#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/BD8H6T0dIk https://twitter.com/i/web/status/1533912873092653058SecurityVal
2022-06-06 20:52:39#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/r4TY5j7fac https://twitter.com/i/web/status/15339128780755927051Opsec2
2022-06-06 20:50:22#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/erZ3LnPMRl https://twitter.com/i/web/status/1533914128489893891TalleyBilly
2022-06-06 20:41:30#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/DVhWjLWUhh https://twitter.com/i/web/status/1533909849695825922securityinfras
2022-06-06 20:35:21#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/xh6cprwvTS https://twitter.com/i/web/status/1533906579191382017smbgurus
2022-06-06 20:33:06Another trophy to add to my hunting list : https://t.co/QtOZDNBaml CVE-2022-30190 #Follina #Microsoft #Word #msdt… https://t.co/iChf1TnNjQ https://www.pirates.re/mes-contributions https://twitter.com/i/web/status/1533907884433674242Mekhalleh
2022-06-06 20:22:34#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/uJfTx2QfHr https://twitter.com/i/web/status/1533906075249942529o_integradas
2022-06-06 20:13:13#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/JENn9qlmsJ https://twitter.com/i/web/status/1533902047841591298NorcomSolutions
2022-06-06 20:13:00#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/2oDccglEjO https://twitter.com/i/web/status/1533902551069954051SydowIS
2022-06-06 20:00:37#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/THP5wowWpN https://twitter.com/i/web/status/1533900789592297475e_computech
2022-06-06 20:00:21#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/OsgKsfV1Nv https://twitter.com/i/web/status/1533901547737841665carloyolax
2022-06-06 19:50:46#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/Q08A0WpNh5 https://twitter.com/i/web/status/1533898525003722752systems_managed
2022-06-06 19:50:33#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/0G0hNOOdxy https://twitter.com/i/web/status/1533898528933683201gatanasio_71
2022-06-06 19:50:22#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/WXLDeJ39JI https://twitter.com/i/web/status/1533898782705950721khronostelecom
2022-06-06 19:40:28#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/sDRX0lbNa9 https://twitter.com/i/web/status/1533896009163603974BornConsultants
2022-06-06 19:40:09#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/wS7FNdJb3m https://twitter.com/i/web/status/1533896511578378240Regem_ITS
2022-06-06 19:31:37#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/3RlPtaBpv5 https://twitter.com/i/web/status/1533892233203789824Gl7Grupo
2022-06-06 19:31:02#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/k8jCdUHWJh https://twitter.com/i/web/status/1533893491692126208Fzimmerb
2022-06-06 19:30:56#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/fZmk2LQvRA https://twitter.com/i/web/status/1533893496662269952fuselogix
2022-06-06 19:30:18#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/wgRsf6SgQR https://twitter.com/i/web/status/1533893745921359873CyberSecManaged
2022-06-06 19:21:05#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/3LjWrmYxT4 https://twitter.com/i/web/status/1533888963295039493OmniBSolutions
2022-06-06 19:20:46#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/naJQiPwafV https://twitter.com/i/web/status/1533889465181163520smbgurus
2022-06-06 19:20:17#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/VvEwIot7aX https://twitter.com/i/web/status/1533890223662415874amsinetworks
2022-06-06 19:11:25#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/gGSzrLWfQZ https://twitter.com/i/web/status/1533886457072566273FortiOne_IT
2022-06-06 19:10:27#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/IUjnVyIscN https://twitter.com/i/web/status/1533888709929619456NowTechSolution
2022-06-06 19:01:19Informe de señal de amenazas de #FortiGuardLabs: Follina: vulnerabilidad MSDT de Windows de 0 días (CVE-2022-30190)… https://t.co/B9PLzvS9K6 https://twitter.com/i/web/status/1533882237351079938o_integradas
2022-06-06 19:00:20#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/cAgB7VzD3Z https://twitter.com/i/web/status/1533885186647130112jorpnes
2022-06-06 19:00:08#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/tWlI8KbATh https://twitter.com/i/web/status/1533885691058331648MarcioLoboM1
2022-06-06 18:44:44Alert: Follina aka CVE-2022-30190 https://t.co/QO50RRJh2p https://hubs.ly/Q01cY1v10Security7Net
2022-06-06 18:42:56#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/RbY9cX1zjm https://twitter.com/i/web/status/1533880664889630720Innov8tv
2022-06-06 18:42:23CVE-2022-30190 #Follina #Microsoft #Word #msdt #zeroday #anssi #FIC Seem to be ready for landing to @metasploit ma… https://t.co/iYfP2UkOfJ https://twitter.com/i/web/status/1533880862298841089Mekhalleh
2022-06-06 18:41:51#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/2ySAKjsyPA https://twitter.com/i/web/status/1533880917118308352Boylesinfosys
2022-06-06 18:36:13#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/HWnbUvlg93 https://twitter.com/i/web/status/1533877133789089792SeamlessAdvSolu
2022-06-06 18:33:46#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/NfDO7bwVjR https://twitter.com/i/web/status/1533878392084434944SphereIS360
2022-06-06 18:32:00@Microsoft recently published an advisory on a newly identified #zeroday vulnerability #Follina (CVE-2022-30190). C… https://t.co/olXP0cvsuT https://twitter.com/i/web/status/1533878581096587264PolySwarm
2022-06-06 18:25:11#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/3UPz8fJ7or https://twitter.com/i/web/status/1533875124872544257trinitynetworx
2022-06-06 18:24:30#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/Hyu2jjoyY2 https://twitter.com/i/web/status/1533875377663315968CanteraIT
2022-06-06 18:24:02Analizando y explotando FOLLINA ( CVE-2022-30190 ) #ciberseguridad https://t.co/7d4RqKd5Ib https://ciberseguridad.blog/analizando-y-explotando-follina-msdt-cve-2022-30190/IngAbreuOrtiz
2022-06-06 18:23:03#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/E150l5p8d1 https://twitter.com/i/web/status/1533875623692840960bbserviceskv
2022-06-06 18:22:30#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/XmiaWNiDK4 https://twitter.com/i/web/status/1533875877376843780InfoSecAcumen
2022-06-06 18:20:30#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/LaXy0UqkxL https://twitter.com/i/web/status/1533876379913179137ratech_services
2022-06-06 18:15:41#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/0OCnPPQ6c7 https://twitter.com/i/web/status/1533873108150534146SecureERP
2022-06-06 18:02:37#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/WhJILLKdAV https://twitter.com/i/web/status/1533869838350835713kgalus
2022-06-06 18:01:29#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/g3hJ2IJcgn https://twitter.com/i/web/status/1533870339284946945elev8tech
2022-06-06 17:50:53Well said! CVE-2022-30190: Zero Click Zero Day in Microsoft Support Diagnostic Tool Exploited in the Wild by… https://t.co/MaD0UgJcY3 https://twitter.com/i/web/status/1533868714289795073CTOUniverse
2022-06-06 17:42:34#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/e1VbZ1V5CJ https://twitter.com/i/web/status/1533864805215395842Michael_StJohn
2022-06-06 17:40:51#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/iH19alxrbG https://twitter.com/i/web/status/1533865324474269696gatanasio_71
2022-06-06 17:40:24#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/1P8MALFrqm https://twitter.com/i/web/status/1533866313298460672ArrakisConsult
2022-06-06 17:21:41#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/lPVkID4B7q https://twitter.com/i/web/status/1533859773392867328TisecI
2022-06-06 17:21:20#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/ZzxLaelC2w https://twitter.com/i/web/status/1533860023230676992iMatrixVienna
2022-06-06 17:11:51#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/2v9Pi8oPBb https://twitter.com/i/web/status/1533858265800617984andmacsil
2022-06-06 17:11:04Still the only patch for Follina / CVE-2022-30190 available https://t.co/XHjOj1Wkkq https://twitter.com/0patch/status/1533858159248429058mkolsek
2022-06-06 16:51:03#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/GyEfDnFxmz https://twitter.com/i/web/status/1533852723657027590SolventTechGh
2022-06-06 16:41:26Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center… https://t.co/UomqvCyg9Z https://twitter.com/i/web/status/1533850056998232065JeffEnglander
2022-06-06 16:21:55Nice new ms-msdt Follina (CVE-2022-30190) artifact for @velocidex users, thanks @mgreen27 https://t.co/56cbPCuqTw https://docs.velociraptor.app/exchange/artifacts/pages/msdtfollina/eric_capuano
2022-06-06 15:18:30CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-06 15:05:09#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/8lWt9WglmP https://twitter.com/i/web/status/1533824285332094977actisoft_tech
2022-06-06 15:00:29#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/GZHEml1SUn https://twitter.com/i/web/status/1533825797802315777stinnerIT
2022-06-06 14:52:06#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/323oMEwyE1 https://twitter.com/i/web/status/1533822274679324675agrisols
2022-06-06 14:43:21#software GitHub - onecloudemoji/CVE-2022-30190: CVE-2022-30190 Follina POC https://t.co/Y2hKKDh5sO https://t.co/ph88jUC54k https://ift.tt/wa39ugSsoftwaremars
2022-06-06 14:20:28#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/exED7cmY2K https://twitter.com/i/web/status/1533815980735987712OptimisingIT
2022-06-06 14:00:59CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction | Securelist https://t.co/Uc7T1IpE6V https://securelist.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/106703/ohhara_shiojiri
2022-06-06 14:00:15Analizando y explotando FOLLINA MSDT ( CVE-2022-30190 ) https://t.co/W3POJ4U6wL https://ciberseguridad.blog/analizando-y-explotando-follina-msdt-cve-2022-30190/elhackernet
2022-06-06 13:51:20#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/Xd6DxZyyF7 https://twitter.com/i/web/status/1533807175214288896nimedeux
2022-06-06 13:42:47📣 Vulnerability (Follina) CVE-2022-30190 allows the Microsoft Support Diagnostics Utility to be abused via the ms-… https://t.co/g4k55LucGj https://twitter.com/i/web/status/1533804655087472640evernetco
2022-06-06 13:30:33#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/AFYEhXExRF https://twitter.com/i/web/status/1533802895262593026FrikEnTwit
2022-06-06 13:10:52Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-26134: 2.1M (audience size) CVE-2022-30190: 951K CVE-2021-440… https://t.co/15osvMuKu6 https://twitter.com/i/web/status/1533795856155131905CVEtrends
2022-06-06 12:50:32Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/SELx3Vf4Qe https://dy.si/XGCfyYvcdx001
2022-06-06 12:50:25#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/KO4wSDPJHu https://twitter.com/i/web/status/1533790563308388352MicheleCiacci
2022-06-06 12:21:53#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/m5xPyxebSw https://twitter.com/i/web/status/1533785026919292928iitcoman
2022-06-06 12:21:17#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/zQerTMT6bo https://twitter.com/i/web/status/1533785031512145920comztech
2022-06-06 12:15:29#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/IZV9sl9d5k https://twitter.com/i/web/status/1533781001708658690CarerraHoldings
2022-06-06 11:54:34#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/QOGu8Ys7gq https://twitter.com/i/web/status/1533776982760120325TechExDigitals
2022-06-06 11:36:09#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/ij1wOGEvj5 https://twitter.com/i/web/status/1533770934531801088LtdNamaste
2022-06-06 11:33:02#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/X8QPeWVy3s https://twitter.com/i/web/status/1533771694657228801AVFZC
2022-06-06 11:11:25#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/tmydL0F38h https://twitter.com/i/web/status/1533766403458748420Acenetworkscy
2022-06-06 11:11:09#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/reCfZFz59R https://twitter.com/i/web/status/1533767165404405760ibseleven
2022-06-06 11:10:17#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/lPS3fvXwRd https://twitter.com/i/web/status/1533767914146385922DataAnalist1
2022-06-06 11:02:38#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/E9KKtXKXuA https://twitter.com/i/web/status/1533764915953119235iitcoman
2022-06-06 10:40:16#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/POOKYRHr1o https://twitter.com/i/web/status/1533760364646645761FnCybersecurity
2022-06-06 10:30:42#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/v2MTN7epUS https://twitter.com/i/web/status/1533757092724719617ConceptCareTech
2022-06-06 10:12:06CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/u92G96rdOC https://t.co/SRMUxDOm23 http://dlvr.it/SRhV31GlynWhitehat
2022-06-06 10:10:33CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction 👉 https://t.co/w2gvX6wv5c https://t.co/oWTbRAWaTS https://kas.pr/j9oke_kaspersky
2022-06-06 10:10:27#Microsoft ha reconocido e identificado bajo el código CVE-2022-30190 la vulnerabilidad que utiliza un documento de… https://t.co/fL2r4yaxwH https://twitter.com/i/web/status/1533752734213672961cvctic_es
2022-06-06 09:53:02CVE-2022-30190 (Follina) vulnerability in MSDT: description and #infosec #infosecurity #cybersecurity #threatintel… https://t.co/fO2yuXUr2n https://twitter.com/i/web/status/1533745553661644800CyberIQs_
2022-06-06 09:52:55CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction At the end of May, researchers from… https://t.co/VT5LlEL6lJ https://twitter.com/i/web/status/1533746215850057728two_minwarning
2022-06-06 09:40:43https://t.co/x0HusdtHZi CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction #cybersecurity https://securelist.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/106703/netsecu
2022-06-06 09:40:34#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/7tesSsnsPb https://twitter.com/i/web/status/1533740987062882304TechnologiesZm
2022-06-06 09:40:16CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/pS2nE67XxO https://t.co/YjwZDbL1yc https://securelist.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/106703/jeffespo
2022-06-06 09:22:56CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/fY7Mb4YfG5 Securelist… https://t.co/bWgpOEIWla https://securelist.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/106703/ https://twitter.com/i/web/status/1533739013089247233PentestingN
2022-06-06 09:22:24Threat Advisory: CVE-2022-30190 Follina - Severe Zero-day #Vulnerability discovered in MSDT https://t.co/eEhaNp9KwP #Sec_Cyber https://www.securecybersolution.com/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt/CyberSecDN
2022-06-06 09:10:31CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/bVJpacPFRE https://ift.tt/Wjha3VUmalshiekh
2022-06-06 08:48:21Securelist Blog | CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/10WenNjvk0 https://stpmvt.com/3x9fW8JStopMalvertisin
2022-06-06 08:47:58https://t.co/P96jSQrAOj CVE-2022-30190 (Folina) Payload in ZoomEye , Of course I think most of the attack payload… https://t.co/o8iQ0UQq31 https://www.zoomeye.org/searchResult?q=%22ms-msdt:/id%20PCWDiagnostic%22 https://twitter.com/i/web/status/153372824355500441680vul
2022-06-06 08:46:45CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/EyiNX1AoQb #news… https://t.co/MIjahVigDq http://dlvr.it/SRhH3W https://twitter.com/i/web/status/1533728536946610177DeepFriedCyber
2022-06-06 08:45:50CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/rDDc4JHTam https://ift.tt/Wjha3VUoctavianior
2022-06-06 08:43:22CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/F37rybdKQh https://www.itsecuritynews.info/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/IT_securitynews
2022-06-06 08:42:54CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/zP7UjOyLlj https://t.co/57wkKX5U3P http://dlvr.it/SRhHcfnet1
2022-06-06 08:33:50#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/8FDHYV5ino https://twitter.com/i/web/status/1533725635939557376MYBintara
2022-06-06 08:33:27CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/oaqMrypDNf https://securelist.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/106703/Cyberologist_en
2022-06-06 08:33:04CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction: At the end of May, researchers repor… https://t.co/8lzJCrPkGN https://twitter.com/i/web/status/1533726148827283458shah_sheikh
2022-06-06 08:31:48#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/ubQo30bbCS https://twitter.com/i/web/status/1533726392617140224digitrackspl
2022-06-06 08:31:16CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction https://t.co/nKktVLeiHy https://ift.tt/Wjha3VUMrsYisWhy
2022-06-06 08:30:38CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction: https://t.co/KGiCuqyxne by Securelis… https://t.co/uMlOTTNm7i https://ift.tt/Wjha3VU https://twitter.com/i/web/status/1533726769232195585Alevskey
2022-06-06 08:12:55#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/afWtYEf3UG https://twitter.com/i/web/status/1533721106011521025everbextec
2022-06-06 08:12:36#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/FPuIURdh0x https://twitter.com/i/web/status/1533721358986891264IntriousTech
2022-06-06 07:50:40Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/cT52lKESu0 https://piyolog.hatenadiary.jp/entry/2022/06/02/010119Pyo0072
2022-06-06 07:43:19.@FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The… https://t.co/h8PcGFp3Bk https://twitter.com/i/web/status/1533712877995032576ChrisRobertsSec
2022-06-06 07:42:36.@FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The… https://t.co/APRHA72145 https://twitter.com/i/web/status/1533713191141769216ChrisRobertsSec
2022-06-06 07:40:56"We are already seeing attacks that look like APT campaigns taking advantage of the CVE-2022-30190 (#Follina) bug.… https://t.co/gLLuf3CrJw https://twitter.com/i/web/status/1533714758024966144StopMalvertisin
2022-06-06 07:40:22Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される | トレンドマイクロ セキュリティブログ - https://t.co/tPOvA5vwzF https://go.shr.lc/3zjkpIvdexderrewedd447
2022-06-06 07:21:37Ya estamos viendo ataques que parecen campañas de APT y que aprovechan el fallo CVE-2022-30190 (Follina). Son más s… https://t.co/3poQ38BDW1 https://twitter.com/i/web/status/1533708960418627584ssantosv
2022-06-06 07:00:28360 Sandbox Cloud professional & professional enhanced subscription now support CVE-2022-30190 vulnerability exploi… https://t.co/Po1gcFK6Hp https://twitter.com/i/web/status/1533705152670351361360sandboxcloud
2022-06-06 06:10:45#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/37gwolaJNZ https://twitter.com/i/web/status/1533684111805755392INStream10
2022-06-06 06:10:28#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/qe8Mfwoidi https://twitter.com/i/web/status/1533689396356124672shanil_daya
2022-06-06 05:10:33#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/P7dxibmb0m https://twitter.com/i/web/status/1533677569475809281Trust3Security
2022-06-06 04:40:54#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/w63iPEAGje https://twitter.com/i/web/status/1533669263457894401MBITJapan
2022-06-06 04:40:28Here is a hard trance track I made from CVE-2022-30190 / MESDETTY samples via #Techtronica Enjoy https://t.co/n8DNVa0zoO https://www.youtube.com/watch?v=k-GYiQyEaL0Laughing_Mantis
2022-06-06 04:00:51#Follina CVE-2022-30190 https://t.co/z5dp52Lswd Name: SOP.doc URL: http://93.115.26[.]76:8000/index.html Payload: h… https://t.co/Z5bCmJlTA8 https://www.virustotal.com/gui/file/c67ad1e4676506f59f6ac3e2de3ba5fa73c97b817848a320789695a141a88374/detection https://twitter.com/i/web/status/1533659744015368192StopMalvertisin
2022-06-06 03:31:30#Follina CVE-2022-30190 🤦‍♂️Missed this one while hunting: 7fafbd8d6b15279ca377d5d871ecb108284fc28f905b73488850999d… https://t.co/9JIzOdtVb5 https://twitter.com/i/web/status/1533651010111307776StopMalvertisin
2022-06-06 03:20:595件のコメント https://t.co/wCM1GJZ05h “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog” https://t.co/Fvo4VzWss2 https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2022/06/02/010119#utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/49K5phmtXWa_yasui
2022-06-06 02:20:19LIVE NOW! How To Detect CVE-2022-30190 : CVE 0-day MS Office RCE aka msdt follina ... https://t.co/lKdshqyNBw via @YouTube https://youtu.be/1OQNmN9mw8Qlahilabs
2022-06-06 02:11:21A zero-day vulnerability in Microsoft Office known as "Follina" (number CVE-2022-30190) could effect MetaMask on PC… https://t.co/eGukKoI9Sr https://twitter.com/i/web/status/1533630051929014273KeystoneWallet
2022-06-06 01:30:08Exploiting MSDT 0-Day CVE-2022-30190 - @_JohnHammond https://t.co/2VVVYN2qxm #InfoSec #CyberSecurity #Security… https://t.co/nxPO50KuHx https://www.youtube.com/watch?v=dGCOhORNKRk https://twitter.com/i/web/status/1533621993890881536s3xcur1ty
2022-06-06 01:12:20CVE-2022-30190 - Microsoft Windows Support Diagnostic Tool RCE. https://t.co/xtHodxTOJ9 https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190AlexNguyen65
2022-06-06 01:00:38@Microsoft lack of proper mitigation for CVE-2022-30190 / Follina is embarrassing. Promote the workaround of disab… https://t.co/xQ92h6qY7T https://twitter.com/i/web/status/1533614239843229699jdcguy
2022-06-06 00:49:18CVE-2022-30190 - Microsoft Windows Support Diagnostic Tool RCE. https://t.co/xtHodxTOJ9 https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190AlexNguyen65
2022-06-06 00:40:47Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/sOlyIBxSt9 https://piyolog.hatenadiary.jp/entry/2022/06/02/010119million1211
2022-06-05 22:20:50KnowledgeSharing/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190 at main · NafisiAslH/KnowledgeSharing… https://t.co/5NAwpNts5j https://twitter.com/i/web/status/1533573180480176128cornichecorp
2022-06-05 18:50:41Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/8BnUH78BnF https://twitter.com/i/web/status/1533519585894354944G_Freudenthal
2022-06-05 18:20:42@Windows @Microsoft @MSFTnews Sir, Please patch this Follina exploit which is assigned as CVE-2022-30190 As Soon As… https://t.co/UDkXiYz74Q https://twitter.com/i/web/status/1533512141705289730Yash84117802
2022-06-05 18:20:06Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/VoAKnhJ00P https://twitter.com/i/web/status/1533513757258809344W_Gartner
2022-06-05 15:50:19KnowledgeSharing/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190 at main · NafisiAslH/KnowledgeSharing… https://t.co/cSVCior783 https://twitter.com/i/web/status/1533474954070597634corizance
2022-06-05 15:10:13CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-05 15:10:09CVE-2022-30190 : MS MSDT Follina One Click https://t.co/6hYSLBnWgM https://github.com/AchocolatechipPancake/MS-MSDT-Office-RCE-FollinaLulztigre
2022-06-05 14:50:27Disable MSDT URL (CVE-2022-30190, Follina) with Quest KACE SMA & PowerShell YT: https://t.co/7qvvDBWBDo Blog EN:… https://t.co/bhFv0QUmje https://www.youtube.com/watch?v=6KqwP9L9dsI&list=PLgYTd3JpUdjHUR0fEZhhzQ0uZyc2340-y&index=1 https://twitter.com/i/web/status/1533460516454162432duesiblog
2022-06-05 14:12:41#Follina vulnerability actively exploited in the wild affecting MS Doc files tracked as CVE-2022-30190 https://t.co/a0WwG3t1RH https://twitter.com/secure_blink/status/1531574522524184577secure_blink
2022-06-05 13:14:07Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-26134: 1.4M (audience size) CVE-2022-30190: 259.6K CVE-2021-4… https://t.co/JcraTJ0LnR https://twitter.com/i/web/status/1533433469874872320CVEtrends
2022-06-05 12:51:33今宵のサイバーセキュリティーについて気になることをお伝えします。 CVE-2022-30190 マイクロソフト サポート診断ツール(MSDT)の脆弱性について回避策のガイダンス 6月2日 ゆうちょ銀行を騙るフィッシングメールにご注… https://t.co/EgeAUwmxTw https://twitter.com/i/web/status/1533428523310149633t_nihonmatsu
2022-06-05 11:04:36CVE-2022-30190, aka Follinani9ht_f0rever
2022-06-05 10:42:24Microsoft varuje před masivním zneužíváním zranitelnosti CVE-2022-30190 https://t.co/IVXSkEjpYR https://www.actinet.cz/bezpecnost_informacnich_technologii/j1/l33/no5340/microsoft-varuje-pred-masivnim-zneuzivanim-zranitelnosti-cve-2022-30190.htmlactinet
2022-06-05 10:26:01LOADER vs MSDT Zero-Day (CVE-2022-30190) @nicl4ssic @ITexpertTz @TOTTechs @tzanonima @asatayo @blackninja233… https://t.co/Af0uIITBMu https://twitter.com/i/web/status/1533391230075379714AuxGrep
2022-06-05 10:05:42I have posted on my blog the walkthrough of the security incident "Follina- 0 day vulnerability // CVE-2022-30190 "… https://t.co/PCutHLszd6 https://twitter.com/i/web/status/1533382807296303107Infosec_Domi
2022-06-05 09:32:21KnowledgeSharing/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190 at main · NafisiAslH/KnowledgeSharing… https://t.co/tHaUqcQucy https://twitter.com/i/web/status/1533378636883034115JsPadoan
2022-06-05 09:16:13Cyber News : Une vulnérabilité critique découverte sur Microsoft Office !! (CVE-2022-30190) La Zero-Day RCE répond… https://t.co/PePlvVIzSy https://twitter.com/i/web/status/1533373113416790017Guardia_School
2022-06-05 08:11:51KnowledgeSharing/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190 at main · NafisiAslH/KnowledgeSharing #Infosec… https://t.co/fRXlZyUZpW https://twitter.com/i/web/status/1533358287554592768Necio_news
2022-06-05 08:01:41KnowledgeSharing/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190 at main · NafisiAslH/KnowledgeSharing… https://t.co/Mw7w46x3Kn https://twitter.com/i/web/status/1533357239431479296cybersecboardrm
2022-06-05 07:20:28KnowledgeSharing/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190 at main · NafisiAslH/KnowledgeSharing… https://t.co/gbpOrXm3F1 https://twitter.com/i/web/status/1533347427616423936StanleyEpstein
2022-06-05 06:13:41GitHub - AchocolatechipPancake/MS-MSDT-Office-RCE-Follina: CVE-2022-30190 | MS-MSDT Follina One Click - https://t.co/R8Ipra7aZG https://github.com/AchocolatechipPancake/MS-MSDT-Office-RCE-Follinamoton
2022-06-05 05:21:38@caleb_friesen2 CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability 🔥🔥sandeep_sriniv
2022-06-05 05:02:04KnowledgeSharing/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190 at main · NafisiAslH/KnowledgeSharing… https://t.co/Zw6tEjLlCJ https://twitter.com/i/web/status/1533310180825436162MnkeniFrancis
2022-06-05 04:50:52Prevent yourself from MSDT Follina 0-day (CVE-2022-30190) https://t.co/atGvLymTaa #infosec #msdt #folina #zeroday https://t.co/7C9ucAxJF8 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/towsifseyam
2022-06-05 04:20:17Hello @msftsecurity @MsftSecIntel @Microsoft - is MS Defender for O365/MDO already detecting/blocking CVE-2022-30190 aka Follina? Thank you.akosijesyang
2022-06-05 04:00:22CVE-2022-30190 https://t.co/enjhnkP6as #Pentesting #CyberSecurity #Infosec https://t.co/q7zVCIczmV https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190?fbclid=IwAR0UczaWjJNKWTnlvZHCXsWhABuae0kDRKx3hj-wo0LS1y8TZ32HR5w9t3wptracesecurity
2022-06-05 00:00:27La nueva vulnerabilidad CVE-2022-30190, conocida como #Follina, permite la explotación de la herramienta #Microsoft… https://t.co/8RPWxq3n0x https://twitter.com/i/web/status/1533236299561312257GustavoCols
2022-06-04 23:00:55Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/sL5INTAxF1 https://twitter.com/i/web/status/1533221104612950022MattHar21674472
2022-06-04 22:50:45Today I launched an AWS environment to test out the MS-MSDT "Follina" CVE-2022-30190 exploit on a Windows 2019 Serv… https://t.co/tGVc7nCWHt https://twitter.com/i/web/status/1533217731348160513GalvanHacking
2022-06-04 21:20:06#Follina #Office 🪟 (CVE-2022-30190) Still need mitigate this 0-day *manually* ⚠️malware could detonate 🧨 *just* b… https://t.co/Ew1x48lLET https://twitter.com/i/web/status/1533196627204141058unedevdapp
2022-06-04 21:00:20Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool #cloudsecurity #cybersecurity #azure #msftsecurity… https://t.co/zoT6QFSAdT https://twitter.com/i/web/status/1533190562395918343sukumarraju
2022-06-04 20:40:100patch Blog: Free Micropatches For "Follina" Microsoft Diagnostic Tool Remote Code Execution 0day (CVE-2022-30190) https://t.co/nlp7oDnLIg https://blog.0patch.com/2022/06/free-micropatches-for-follina-microsoft.htmlmsolde
2022-06-04 15:16:10CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-04 15:04:16Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた https://t.co/9izqbs2SsP https://piyolog.hatenadiary.jp/entry/2022/06/02/010119kirimemo
2022-06-04 13:42:04📣 Vulnerability (Follina) CVE-2022-30190 allows the Microsoft Support Diagnostics Utility to be abused via the ms-… https://t.co/6vCthj7D5w https://twitter.com/i/web/status/1533079878794285056evernetco
2022-06-04 13:10:42Windows Destek Tanı Aracı'nda (MSDT) yeni bulunan güvenlik açığı CVE-2022-30190, diğer adıyla Follina, ofis dosyala… https://t.co/oym4soTKK4 https://twitter.com/i/web/status/1533071156596690945KasperskyTR
2022-06-04 12:55:15Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/YUclhuKxG9 #bugbounty, #computer, #cyber, #ethical, #hacked,… https://t.co/QvK8q8m7Lj https://ift.tt/VYh1Mi0 https://twitter.com/i/web/status/1533063822260547584Securitytemple
2022-06-04 11:41:542) "Zero-Day" Microsoft Office CVE-2022-30190 Vulnerability (Follina) https://t.co/nVPrbFbRlR… https://t.co/3i4sxNyqr6 https://www.fortinet.com/blog/threat-research/analysis-of-follina-zero-day https://twitter.com/i/web/status/1533049877529239553CyberBankSa
2022-06-04 11:11:21New post from https://t.co/uXvPWJy6tj (CVE-2022-30190 (windows_10, windows_11, windows_7, windows_8.1, windows_rt_8… https://t.co/1hEpnGQnQI http://www.sesin.at https://twitter.com/i/web/status/1533038411539525633WolfgangSesin
2022-06-04 11:10:59New post from https://t.co/9KYxtdZjkl (CVE-2022-30190 (windows_10, windows_11, windows_7, windows_8.1, windows_rt_8… https://t.co/SCX49qI3ls http://www.sesin.at https://twitter.com/i/web/status/1533038412755787776www_sesin_at
2022-06-04 11:05:04Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される | トレンドマイクロ セキュリティブログ https://t.co/TnukUeXo9b https://blog.trendmicro.co.jp/archives/31412ohhara_shiojiri
2022-06-04 10:23:16mitigate-folina Mitigates the "Folina"-ZeroDay (CVE-2022-30190) This script will backup and then remove the affec… https://t.co/1YlIHXiEfJ https://twitter.com/i/web/status/1533028446921695234hack_git
2022-06-04 10:22:55FollinaScanner A tool written in Go that scans files & directories for the #Follina exploit (CVE-2022-30190)… https://t.co/slfobzwgyI https://twitter.com/i/web/status/1533028461685743616hack_git
2022-06-04 10:22:35CVE-2022-30190 MS-MSDT #Follina One Click https://t.co/1d7bBeDLru #cve #RCE https://t.co/xxcGzLISEM https://t.co/JedUEm08wb https://github.com/AchocolatechipPancake/MS-MSDT-Office-RCE-Follina https://t.me/hackgit/4459hack_git
2022-06-04 10:01:12Recently, a zero-day vulnerability (number CVE-2022-30190) called "Folina" in Microsoft Office was discovered. An a… https://t.co/bx9EHaJ0RY https://twitter.com/i/web/status/1533024568910131200han70013557
2022-06-04 09:37:59There is the recently discovered Follina exploit, which is assigned as CVE-2022-30190. It allows the hacker to get… https://t.co/eWNWcdQUeh https://twitter.com/i/web/status/1533016260463587329amir1611_
2022-06-04 08:55:09CVE-2022-30190 : Microsoft Windows Support Diagnostic Tool RCE https://t.co/LO8FyLLwGy https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190Lulztigre
2022-06-04 08:53:48Analizando y explotando "FOLLINA" MSDT CVE-2022-30190 https://t.co/FrZBs7AUw2 https://ciberseguridad.blog/analizando-y-explotando-follina-msdt-cve-2022-30190/hackplayers
2022-06-04 08:51:17[Recomendado]Analizando y explotando "FOLLINA" MSDT CVE-2022-30190 https://t.co/3A5tkpCNNU #seguridadsi #ciberseguridad https://zpr.io/hi6U2gqrBCCqseguridad_si
2022-06-04 08:30:16Die neue Schwachstelle CVE-2022-30190, auch #Follina genannt, ermöglicht den Exploit des Windows Support Diagnostic… https://t.co/vX7Sn13jym https://twitter.com/i/web/status/1533003127238144001Kaspersky_DACH
2022-06-04 07:53:31CVE-2022-30190 AKA "FOLLINA" MSDT: ADVISORY AND TECHNICAL ANALYSIS https://t.co/vp5fvWKl6R https://notes.netbytesec.com/2022/06/cve-2022-30190-aka-follina-msdt.htmlRempahRz
2022-06-04 07:51:27#Microsoft Office CVE-2022-30190 #Vulnerability (#Follina) #Exploitation https://t.co/4W69g5Vt6L https://www.hackbyte.org/microsoft-office-cve-2022-30190-vulnerability-follina-exploitation/habib_karatas
2022-06-04 07:41:27Officeにゼロデイ脆弱性(CVE-2022-30190)が発覚、Microsoftは緩和策を公開。現時点で修正パッチは未提供 https://t.co/j0Xr1E2mpM https://t.co/LWNa7liU0v http://dlvr.it/SRbhZ6tweet2014002
2022-06-04 07:41:17Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた https://t.co/YFGv3ZNcoM https://piyolog.hatenadiary.jp/entry/2022/06/02/010119moneymog
2022-06-04 07:03:06Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される | #情報セキュリティ | #サイバー攻撃 | #ランサムウェア https://t.co/HgQFgM2U9G_jiyugaoka_
2022-06-04 07:02:08Coverage Advisory for CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulner… https://t.co/dRBETxBpwD https://twitter.com/i/web/status/1532979592197296128jukkapaulin
2022-06-04 06:41:48New post from https://t.co/uXvPWJy6tj (Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability)… https://t.co/nm9K0RzwKv http://www.sesin.at https://twitter.com/i/web/status/1532974212444565504WolfgangSesin
2022-06-04 06:41:36New post from https://t.co/9KYxtdZjkl (Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability)… https://t.co/MeMF7TViuE http://www.sesin.at https://twitter.com/i/web/status/1532974213748989952www_sesin_at
2022-06-04 06:11:24【トレンドマイクロ】 Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される #cybersecurity #security #news https://t.co/p5wzBpc4N4 https://blog.trendmicro.co.jp/archives/31412IT_security_bot
2022-06-04 05:50:43Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される https://t.co/PWFSSjh48Y https://t.co/xv9ca8HFp2 http://dlvr.it/SRbW3qproty22
2022-06-04 05:50:29Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される - トレンドマイクロ セキュリティブログ [https://t.co/E7PAJqQ0xf] https://t.co/ti7vOinWpU http://securenews.appsight.net/entries/14371 https://blog.trendmicro.co.jp/archives/31412securenews_web
2022-06-04 05:50:28Microsoft製品のゼロデイ脆弱性「Follina(CVE-2022-30190)」が発見される Wed, 01 Jun 2022 15:42:26 +0000 https://t.co/esiNm4Ut31 全確保支援士NEWS https://blog.trendmicro.co.jp/archives/31412kai_ri_0001
2022-06-04 05:31:05Does your anti virus product protect you from the latest unresolved MS Word vulnerability (CVE-2022-30190 Follina)?… https://t.co/PQJmJosMYw https://twitter.com/i/web/status/1532957763881553920aslcs
2022-06-04 04:53:06Word Dokument ermöglicht Aufruf entfernten Code Sicherheitslücke CVE-2022-30190 hat Priorität hoch. Kann über regis… https://t.co/UwnWiDN7zv https://twitter.com/i/web/status/1532946373448028161fpientka
2022-06-04 04:16:37CVE-2022-30190 ddc4c5a2e0542cb809e955925f7692939e0f745e78ee0c808cb91f26b4809bd6 https://sanggap[.]vn/statement/side… https://t.co/hxayrz1Qi5 https://twitter.com/i/web/status/1532935924317048833StopMalvertisin
2022-06-04 01:46:07GitHub Trending Archive, 02 Jun 2022, Unknown. okyyds/yyds, JMousqueton/PoC-CVE-2022-30190, ManasHarsh/Awesome-Web3… https://t.co/WegG2a2bxm https://twitter.com/i/web/status/1532897447563120640motakasoft
2022-06-04 01:11:45自宅パソコンの CVE-2022-30190 回避策 適用完了rarara9x9
2022-06-04 00:32:32The latest update for #Splunk includes "Truth in Malvertising?" and "RCE à La Follina (CVE-2022-30190)".… https://t.co/2ta0U4Fp0o https://twitter.com/i/web/status/1532880242880270337opsmatters_uk
2022-06-03 23:52:03The latest update for #Trustwave includes "Trustwave's Action Response: Microsoft zero-day CVE-2022-30190 (aka Foll… https://t.co/sLIUbPFvsE https://twitter.com/i/web/status/1532870138684485635opsmatters_uk
2022-06-03 23:30:46A short summary explaining the remote code execution vulnerability "Follina" (CVE-2022-30190)… https://t.co/MCmbxBSrYs https://twitter.com/i/web/status/1532865004701089792simon_cybersec
2022-06-03 23:08:32CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina” https://t.co/H76Ks5DkQe https://otx.alienvault.com/pulse/6299dec4dbc2bc4e416dd27bmohdadlan
2022-06-03 22:42:46@YouTubeLATAM Microsoft comparte mitigación para vulnerabilidad en Office zero-day CVE-2022-30190 https://t.co/ctpisM3ZbE https://youtu.be/mX5y43-XWJMJGAITPro
2022-06-03 21:57:18📣 Vulnerability (Follina) CVE-2022-30190 allows the Microsoft Support Diagnostics Utility to be abused via the ms-… https://t.co/lbko8XTlSp https://twitter.com/i/web/status/1532840305275285505evernetco
2022-06-03 21:23:32CertiK安全团队发现,近日,微软Office中一个被称为 "Follina "的零日漏洞(编号CVE-2022-30190)被发现。攻击者可使用微软的微软支持诊断工具(MSDT),从远程URL检索并执行恶意代码。AyaydOmur
2022-06-03 21:13:14Walk The Plank! New blog post from @Mister_MDM called: CVE-2022-30190 and the City of Thousand solutions Check it… https://t.co/4sl95eLZSK https://twitter.com/i/web/status/1532830724683857920azure_pirate
2022-06-03 20:14:04As observed on May 30 by Proofpoint security researchers, APT group TA413 is now using CVE-2022-30190 exploits to e… https://t.co/0ihlAusr8H https://twitter.com/i/web/status/1532814710743113729pfuster
2022-06-03 20:01:01https://t.co/Oda2xMbVsL Cybersecurity Alert - FINRA Notifies Member Firms of Microsoft Alert (CVE-2022-30190) https://tinyurl.com/2cffw2vjprpnews
2022-06-03 18:52:19⚠️ Trustwave SpiderLabs is tracking the critical-rated #zerodayvulnerability CVE-2022-30190, aka #Follina. Threat… https://t.co/itGV0Zweqy https://twitter.com/i/web/status/1532794541341822976Trustwave
2022-06-03 18:41:03⚠️ Trustwave SpiderLabs is tracking the critical-rated #zerodayvulnerability CVE-2022-30190, aka #Follina. Threat… https://t.co/PQLuJQsI27 https://twitter.com/i/web/status/1532791981017120768Trustwave
2022-06-03 18:40:47#Cyble Monitor #CVE-2022-30190 Actively Exploited in the Wild https://t.co/qD8TUx9fJg #threatintel #vulnerability… https://t.co/dL89hwi6qG https://koi-3QNOCUXUFA.marketingautomation.services/net/m?md=cIF7LZFw3QWBNiK0EP4HbeFFsm5yrbCv&utm_ss=szQyNDAzNjEyBwA&utm_ss_social=1 https://twitter.com/i/web/status/1532792620161933312AuCyble
2022-06-03 18:00:10[cti content] comparing CVE-2021-40444 vs CVE-2022-30190 is a fun RFI/task/rabbiting down the curiosity holerejectionking
2022-06-03 17:50:43Super simple #Ansible playbook for the removal of CVE-2022-30190 / MSDT. https://t.co/rQFBsPheZi https://gist.github.com/Patrick-Kelley/c8d67e32c504d4af67346dc576a1619bPKELLEY2600
2022-06-03 17:12:09As observed on May 30 by Proofpoint security researchers, APT group TA413 is now using CVE-2022-30190 exploits to e… https://t.co/4BGY9FP1Gj https://twitter.com/i/web/status/1532769341841760256pfuster
2022-06-03 17:10:49CVE-2022-30190 is insane! 😱rReblando2
2022-06-03 16:30:59Tested out CVE-2022-30190 (Follina) on my VM. It is a simple case of opening a calculator as soon as the document… https://t.co/YbnyxyZwKx https://twitter.com/i/web/status/1532759446753284096AnusshaHari
2022-06-03 16:13:31Rapid7: CVE-2022-30190: "Follina" Microsoft Support Diagnostic Tool Vulnerability. https://t.co/eiPUUmuRSy https://t.co/9wCMTQ9GM2 https://buff.ly/3GJz8hUleratmortd
2022-06-03 15:50:12Mesures correctives pour se protéger de la faille #Follina! #CVE-2022-30190 #CyberSecurity #msdt https://t.co/aORlmqBYGM https://korben.info/patch-follina.htmlPatriceLopez83
2022-06-03 15:32:49So it seems "Follina" CVE-2022-30190 docx version is prevented on some Office version. However RTF and ODT format d… https://t.co/xtr4fwakBe https://twitter.com/i/web/status/1532744402334015488EmericNasi
2022-06-03 15:31:03Como explorar o Follina CVE-2022-30190 https://t.co/ctnTVcC1Ju https://minutodaseguranca.blog.br/como-explorar-o-follina-cve-2022-30190/minutoseguranca
2022-06-03 15:30:54Como explorar o Follina CVE-2022-30190 https://t.co/VSDIGeoHxH https://minutodaseguranca.blog.br/como-explorar-o-follina-cve-2022-30190/MindSec_Brasil
2022-06-03 15:12:12CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-03 14:30:48As observed on May 30 by Proofpoint security researchers, APT group TA413 is now using CVE-2022-30190 exploits to e… https://t.co/oIiYKjhER4 https://twitter.com/i/web/status/1532730103280582657pfuster
2022-06-03 14:11:47Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day #Vulnerability discovered in MSDT https://t.co/iQohDiYdpY https://www.securecybersolution.com/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt/Sec_Cyber
2022-06-03 14:10:35Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT https://t.co/xdZ1p0SKgJ https://www.massblog.xyz/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt/mass_blog_
2022-06-03 14:10:32Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT https://t.co/6wczNfui3U https://www.massblog.xyz/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt/nazmulmarketer1
2022-06-03 14:01:27Technical Tip: Find out how @Fortinet #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol… https://t.co/or9w17piiT https://twitter.com/i/web/status/1532718780358574081aaronokia
2022-06-03 14:00:48CVE-2022-30190 Detection Extended For Directory Traversal - Security Investigation - https://t.co/0zYNBkx8QX https://www.socinvestigation.com/cve-2022-30190-detection-extended-for-directory-traversal/moton
2022-06-03 14:00:25https://t.co/xbM9An6e6n Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT #cybersecurity https://www.seqrite.com/blog/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt/netsecu
2022-06-03 13:45:04Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulne #infosec #infosecurity #cybersecurity… https://t.co/hPz1vqqlfS https://twitter.com/i/web/status/1532717570398343172CyberIQs_
2022-06-03 13:30:01あー、権限昇格は別のテクを使うのか。 / “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog” https://t.co/v8gUiyPuYm https://htn.to/4fwuAEdBjxwaiha8
2022-06-03 13:16:19Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-26134: 6.8M (audience size) CVE-2022-30190: 2.2M CVE-2021-419… https://t.co/wYvfxPs1wN https://twitter.com/i/web/status/1532708689836138497CVEtrends
2022-06-03 13:05:43#Follina CVE-2022-30190 is no joke! Build your defenses now before you get hit with #ransomware. #cybersecurity… https://t.co/eOWYaev7L7 https://twitter.com/i/web/status/1532706595380948992CyberGladius
2022-06-03 12:52:13@stinelinnemann Der er en Windows-sårbarhed CVE-2022-30190 “Follina” der lige nu anvendes meget aktivt ifbm. phishi… https://t.co/K5Fri9nx9K https://twitter.com/i/web/status/1532705399798890497Hargir
2022-06-03 12:51:08"Seqrite Blog": Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT ... ma… https://t.co/9aR7WS3jVf https://twitter.com/i/web/status/1532701173047754753FINSIN_CL
2022-06-03 12:41:21Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/6lahQkDbFC https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/timyardley
2022-06-03 12:28:21CVE-2022-30190: Snorri Ásmundsson from SecureIT took together the must facts for companies #vulnerability #infosec https://t.co/6VaF2wf9nL https://secureit.is/2022/06/vulnerability-alert-cve-2022-30190/LetsSecureIT
2022-06-03 12:28:05Want to understand how CVE-2022-30190 (also called Follina) is working? Read this blog post published on… https://t.co/MlIQGhwrFp https://twitter.com/i/web/status/1532685357241753600simon_cybersec
2022-06-03 12:21:33CVE-2022-30190の件、CNA:MSのBase Score 7.8 HIGHなんだけど、Criticalな気が。 これ ↓ 対応策が分かり易い。早速やっといた。 https://t.co/5OXQwN5A5r http://www.st.ryukoku.ac.jp/~kjm/security/memo/2022/06.html#20220601_msdttaro2006
2022-06-03 12:10:33New application release of Runecast covers #CVE-2022-30190 Microsoft RCE “Follina” Zero-Day Vulnerability ⚠️ Micros… https://t.co/29DWSL29eK https://twitter.com/i/web/status/1532695881803259906Runecast
2022-06-03 12:01:17Microsoft official exploit code: CVE-2022-30190 Please share with friends and family so they may also be protected… https://t.co/PPPAJz4kJC https://twitter.com/i/web/status/1532692614549733377rudrakesh123
2022-06-03 12:00:19The #Follina vulnerability (CVE-2022-30190) was by far the biggest story this week and it will probably keep us bus… https://t.co/Nr3jYzBsOO https://twitter.com/i/web/status/1532693585228865539SI_FalconTeam
2022-06-03 11:40:24Disable MSDT URL Protocol to Protect #Windows from CVE-2022-30190 aka #Follina #vulnerability until there’s any off… https://t.co/K9JDLCHE6z https://twitter.com/i/web/status/1532687894095089664sunnynehrabro
2022-06-03 11:23:18CVE-2022-30190 https://t.co/1PbMtN2HUH #cve GitHub rayorole/CVE-2022-30190 CVE-2022-30190 or "Follina" 0day proo… https://t.co/9K7xLAsfCe https://github.com/rayorole/CVE-2022-30190 https://twitter.com/i/web/status/1532681191098310657hack_git
2022-06-03 11:20:55Zero-day bug #exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/KLVijGrbRb #Sec_Cyber https://www.securecybersolution.com/zero-day-bug-exploited-by-attackers-via-macro-less-office-documents-cve-2022-30190/CyberSecDN
2022-06-03 10:37:15@LinuxHandbook CVE-2022-30190bador37223401
2022-06-03 10:11:40Run the following CMDs on your Windows laptop to safeguard it from #Follina CVE-2022-30190 in administrator mode.… https://t.co/OQ3UVesmzb https://twitter.com/i/web/status/1532665278076661761rbhichher
2022-06-03 10:05:04📣 رصد على مستوى #العالم لمحاولات استغلال لثغرات CVE-2022-30190 المعروفة بـ  #Follina و ثغرة CVE-2021-40444 وذلك بهد… https://t.co/cFmom5WX3f https://twitter.com/i/web/status/1532661286315646977Cyber_Cave_sa
2022-06-03 10:04:14#CERTUA warns about active exploitation of two critical vulnerabilities in-the-wild CVE-2022-30190 aka #Follina and… https://t.co/tUo6WaN4RE https://twitter.com/i/web/status/1532661633260068865Cyber_Cave_sa
2022-06-03 10:03:06Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/hav2yvL13C #security https://piyolog.hatenadiary.jp/entry/2022/06/02/010119G76whizkidz
2022-06-03 09:52:16Pensez à désactiver MSDT par GPO (CVE-2022-30190) Chez moi : bien détecté par @ESET_France vidéo exploit… https://t.co/IY7gfYnzxI https://twitter.com/i/web/status/1532660128746508289xhark
2022-06-03 09:44:13CVE-2022-30190 has been patched https://t.co/Jol2OhgoZx https://digitalskeleton.com.ng/threads/cve-2022-30190-has-been-patched.27565/CEOofDSS
2022-06-03 09:41:10A new Zero day exploit CVE-2022-30190. Disable MSDT to keep safe from it. https://t.co/r5UZIpCLpOitxahmadhere
2022-06-03 09:10:51Additional CVE-2022-30190 / #Follina micropatch issued today for: - Windows Server 20220patch
2022-06-03 09:10:15Shockingly follina has no patch. #CVE-2022-30190 #Security #CyberSecurity https://t.co/akYQd59wIZ https://twitter.com/red0mar/status/1532408091001729025Red0mar
2022-06-03 09:00:53CVE-2022-30190 (Follina)ゼロデイのよい時系列まとめ(Fortinetによる) https://t.co/8IKMpkpGXm https://twitter.com/campuscodi/status/1532431523227521043__kokumoto
2022-06-03 09:00:42CertiK:微软高危零日漏洞可执行任意代码,建议用户使用硬件钱包 微软Office中一个被称为 "Follina "的零日漏洞(编号CVE-2022-30190)被发现。黑客可以取得系统里的权限,并获得对本地系统和运行进程的额… https://t.co/PrzGt90bN8 https://twitter.com/i/web/status/1532647812022009856KvioSatoshi
2022-06-03 09:00:16robots.txt Malware yang menyusupi CVE-2022-30190 cukup membuat pengguna WINDS resah! Outbreak of Follina in Austral… https://t.co/Ea4fPvwrch https://twitter.com/i/web/status/1532647899791650816gila_hickey
2022-06-03 07:51:22The zero-day Follina MSDT vulnerability : How to fix CVE-2022-30190 : https://t.co/wulqLOzc2s #cybersecurity #vulnerability #Follina https://cybersec.vulcan.io/s/the-zero-day-follina-msdt-vulnerability-how-to-fix-cve-2022-30190-4276JoeyShenouda
2022-06-03 06:23:44🚨 Surveillance des #POC (Proof Of Concept) sur : 👉 CVE-2020-2551: https://t.co/Ip4kzwzSjZ 👉 CVE-2022-30190:… https://t.co/HITRTeEnwB https://github.com/0xAbbarhSF/CVE-Exploit https://twitter.com/i/web/status/1532605840959672321OSINT_info
2022-06-03 06:11:33🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-2551: https://t.co/MU3HTYSCt7 👉 CVE-2022-30190… https://t.co/RLzAhRwQyh https://github.com/0xAbbarhSF/CVE-Exploit https://twitter.com/i/web/status/1532604888944975872Prohacktiv3
2022-06-03 05:40:28Hi @MikeDanoski ... and @IntuneSuppTeam With that nasty CVE-2022-30190 going on... we also want to deploy this se… https://t.co/lv8kp3Cdc3 https://twitter.com/i/web/status/1532597407145394178Mister_MDM
2022-06-03 05:20:37CVE-2022-30190 #Follina https://t.co/PzGWTHYcfWguillermopsico
2022-06-03 05:00:34#Follina "Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability" https://t.co/5PhUXMt1aw https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/PanteraPolnocy
2022-06-03 04:41:06#ZERO_DAY_vulnerability MS MSDT Follina Attack Vector live Follina - #Microsoft 0-Day RCE CVE-2022-30190 Explain… https://t.co/f8xRkodY3F https://twitter.com/i/web/status/1532577182966759425Mantis_human
2022-06-03 04:40:37CVE-2022-30190 : Microsoft Windows Support Diagnostic Tool RCE https://t.co/Dp4STrirug https://www.reddit.com/r/netsec/comments/v3ojgg/cve202230190_microsoft_windows_support_diagnostic/Dinosn
2022-06-03 04:40:04CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina” | FortiGuard Labs  https://t.co/wQqdZ4kuQ9 https://www.fortinet.com/blog/threat-research/analysis-of-follina-zero-dayokattm
2022-06-03 04:16:23"The zero-day Follina MSDT vulnerability – how to fix CVE-2022-30190" Finally a great summary about what is this of… https://t.co/Au0Ml33Gmz https://twitter.com/i/web/status/1532573134498328577tresronours
2022-06-03 04:14:25CVE-2022-30190 : Microsoft Windows Support Diagnostic Tool RCE https://t.co/GhTEOKbnYx _r_netsec https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190?fbclid=IwAR0UczaWjJNKWTnlvZHCXsWhABuae0kDRKx3hj-wo0LS1y8TZ32HR5w9t3wbeingsheerazali
2022-06-03 04:06:36"Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability" https://t.co/5PhUXMt1aw https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/PanteraPolnocy
2022-06-03 03:52:02New post: "CVE-2022-30190 : Microsoft Windows Support Diagnostic Tool RCE" https://t.co/c047NKi0EJ https://ift.tt/d6fAJunMyinfosecfeed
2022-06-03 03:06:49CVE-2022-30190 Microsoft Windows Support Diagnostic Tool RCE https://t.co/xI391aMjdx https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190netalexx
2022-06-03 02:57:26Free Micropatches For "Follina" Microsoft Diagnostic Tool Remote Code Execution 0day (CVE-2022-30190). The vulnera… https://t.co/QMMDJjjpsp https://twitter.com/i/web/status/1532552947871227919FAllendesF
2022-06-03 02:56:48The latest update for #Netskope includes "GoodWill Ransomware? Or Just Another Jasmin Variant?" and "CVE-2022-30190… https://t.co/oinYkYt6Ag https://twitter.com/i/web/status/1532553169213050880opsmatters_uk
2022-06-03 02:43:45#Follina CVE-2022-30190 https://t.co/uo7yZDWxSu .RTF Employment Agreement Submitted: 2022-06-02 22 - PH URL: http:/… https://t.co/YKVfp788cm https://www.virustotal.com/gui/file/ca7e9c65fd2cec62110b50581529198c43b7982820a38c912baa81d0294b8126/details https://twitter.com/i/web/status/1532550178171138048StopMalvertisin
2022-06-03 02:35:12The latest update for #ArcticWolf includes "Brute-Force Attacks: How to Defend Against Them" and "CVE-2022-30190 -… https://t.co/8L3F1Fiygu https://twitter.com/i/web/status/1532547835396333585opsmatters_uk
2022-06-03 02:20:36#QuickFix for #Folina in large Corporations; besides registry hack for CVE-2022-30190, in most corporate firewalls… https://t.co/X2Un2ASzsg https://twitter.com/i/web/status/1532547518126596113haxel0rd
2022-06-03 02:12:50マジか… / “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog” https://t.co/p9Mtfi8XCR https://htn.to/39zo6rMf9Kkwdnet
2022-06-03 02:00:47CVE-2022-30190 : Microsoft Windows Support Diagnostic Tool RCE https://t.co/IztgFGowq9 https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190?fbclid=IwAR0UczaWjJNKWTnlvZHCXsWhABuae0kDRKx3hj-wo0LS1y8TZ32HR5w9t3w_r_netsec
2022-06-03 02:00:14CVE-2022-30190 : Microsoft Windows Support Diagnostic Tool RCE via /r/netsec https://t.co/Tqltj6dUGH #cybersecurity #netsec #news https://ift.tt/MtBaonWCybrXx0
2022-06-03 01:51:35The latest update for #ManageEngine includes "Microsoft zero-day vulnerability, Follina (CVE-2022-30190), exploited… https://t.co/BA4BiSH7Ix https://twitter.com/i/web/status/1532537925275107340opsmatters_uk
2022-06-03 01:20:09P0c Patch / Fix 0day CVE-2022-30190 follina By : impossible1337 https://t.co/mjNQoinNRN https://t.co/eq0jnlGgYX https://dragonforce.io/threads/0day-cve-2022-30190-follina-p0c-and-fix.13144/DragonForceIO
2022-06-03 00:24:41⚠ATTENTION ALL WINDOWS USERS⚠ There is an new Vulnerability (CVE-2022-30190) nicknamed Follina that hackers use to… https://t.co/KFNdyQwfo8 https://twitter.com/i/web/status/1532516267814420506ticMokhu
2022-06-02 23:23:16Understand How Cortex XDR and Cortex XSOAR Protect Organizations Against CVE-2022-30190 aka #Follina #ZeroDay… https://t.co/TIP4t1UQlI https://twitter.com/i/web/status/1532501066797006849cortexbypanw
2022-06-02 22:55:50Ici on part à la découverte de la faille Follina (CVE-2022-30190). Nouveau format de vidéo où je découvre en même… https://t.co/D4E1Xm0J2c https://twitter.com/i/web/status/1532492260574744584OlivierProTips
2022-06-02 22:41:05Zero Day Vulnerability on Windows CVE-2022-30190 😋 #CVE #CyberSecBoazakK
2022-06-02 22:00:48We've been tracking the #Follina zero-day exploit (CVE-2022-30190) that allows hackers to execute malicious… https://t.co/b8GOR9JdQy https://twitter.com/i/web/status/1532477258048364568CentreTechs
2022-06-02 21:43:29#Microsoft dio más detalles de una #vulnerabilidad #0day con #CVSS 7.8 (#CVE-2022-30190) la cual permite a un… https://t.co/XkTYiu9p3D https://twitter.com/i/web/status/1532474922521485314securetia
2022-06-02 21:41:16Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/TtbBqJJoTA https://www.itsecuritynews.info/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-2/IT_securitynews
2022-06-02 21:40:36Top story: CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina” | FortiGuard Labs … https://t.co/MJwuSamHvA https://twitter.com/i/web/status/1532476779486666764infowaropcenter
2022-06-02 21:26:09#FOLLINA (CVE-2022-30190): #MICROSOFT SUPPORT DIAGNOSTIC TOOL 0-DAY VULNERABILITY BEING ACTIVELY EXPLOITED https://t.co/9hoGe7Zvkf https://kdlski.co/3zeNeWMKudelskiSec
2022-06-02 21:25:21People seem to be confusing what CVE-2022-30190 / Follina is and is not. The advantage of this query is that it wil… https://t.co/wGcm4Rj8Fc https://twitter.com/i/web/status/1532469931878539294wdormann
2022-06-02 21:21:59A Microsoft #ZeroDay vulnerability, CVE-2022-30190, emerged over the weekend that allows remote code execution thro… https://t.co/VkEC0S5DM3 https://twitter.com/i/web/status/1532467113079750656TechTargetNews
2022-06-02 21:11:36People seem to be confusing what CVE-2022-30190 / Follina is and is not. The advantage of this query is that it wil… https://t.co/p7XIoyuMJ0 https://twitter.com/i/web/status/1532469120859619328wdormann
2022-06-02 20:52:25#Microsoft #Windows Support Diagnostic Tool (MSDT) RCE Workaround Detection (CVE-2022-30190) https://t.co/DWPN6B3pHi #Nessus https://www.tenable.com/plugins/nessus/161691SecurityNewsbot
2022-06-02 20:28:16Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) @TechCXO https://t.co/ATDtlFKALf https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/kirbywinters
2022-06-02 20:21:41CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/okoPLeSfNw https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/cyber_edu_jp
2022-06-02 20:17:50@MalwareJake The referenced Positive Security report in 2021 has absolutely nothing to do with CVE-2022-30190.wdormann
2022-06-02 20:11:36CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina” | FortiGuard Labs:… https://t.co/gjUYKc1xo4 https://twitter.com/i/web/status/1532453999999598592catnap707
2022-06-02 19:31:18Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/aiEc9N0WvJ https://piyolog.hatenadiary.jp/entry/2022/06/02/010119cyber_edu_jp
2022-06-02 19:31:07Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) #ciberseguridad #cibersecurity https://t.co/xK8vWa6Itb https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/web4x4_es
2022-06-02 19:30:12@geoffg @campuscodi No, it's definitely wrong. Partly caused by there being no definition of what CVE-2022-30190 ac… https://t.co/qzlmlcs5gh https://twitter.com/i/web/status/1532444437669986327wdormann
2022-06-02 19:18:16Follina (CVE-2022-30190): una vulnerabilidad en MSDT | Blog oficial de Kaspersky https://t.co/g7eCaS2hEE https://t.co/IEY4goT0jX http://dlvr.it/SRWMQxwallotechnology
2022-06-02 19:17:34CVE-2022-30190 is a nice entry-level vulnerability for people who want to learn exploitation and defense.martini_tuba
2022-06-02 19:16:550patch Blog: Free Micropatches For "Follina" Microsoft Diagnostic Tool Remote Code Execution 0day (CVE-2022-30190) https://t.co/HTxt9l62dk https://blog.0patch.com/2022/06/free-micropatches-for-follina-microsoft.htmlSecRecon
2022-06-02 19:08:09Follina (CVE-2022-30190): una vulnerabilidad en MSDT | Blog oficial de Kaspersky https://t.co/3hqXGqVDUQ https://t.co/Db6W6WDbmG http://dlvr.it/SRWL7Xjosemiguelnovoa
2022-06-02 19:07:05CVE-2022-30190 0-day vuln... :) #Microsoft #microsoftword #msword @Microsoft192_168_xx_xx
2022-06-02 19:05:05@campuscodi I should have read link. :) Yes seems to be about CVE-2022-30190Riisteri
2022-06-02 18:57:06https://t.co/oAb4raRvRc CVE-2021-40444 and CVE-2022-30190 Exploit Detection: Cobalt Strike Beacon Delivered in a Cy… https://t.co/gOHfo5TyjD https://socprime.com/blog/cve-2021-40444-and-cve-2022-30190-exploit-detection-cobalt-strike-beacon-delivered-in-a-cyber-attack-on-ukrainian-state-bodies/ https://twitter.com/i/web/status/1532431873921667082netsecu
2022-06-02 18:41:08Nice timeline for the CVE-2022-30190 (Folina) zero-day (via Fortinet) https://t.co/XPsgSs0EA7 https://t.co/ysNdEWBpx1 https://www.fortinet.com/blog/threat-research/analysis-of-follina-zero-daycampuscodi
2022-06-02 18:32:18#CVE-2022-30190 is no joke! Build your defenses now before you get hit with #ransomware. #cybersecurity #infosec https://t.co/IJFLd5ffZs https://bit.ly/3wWN8QACyberGladius
2022-06-02 18:22:20Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability https://t.co/fODpnqRvkJ https://t.co/oqQmVhz07T https://buff.ly/3O8buODleratmortd
2022-06-02 18:12:09On May 27, 2022 - CVE-2022-30190 aka #Follina has potential to be of high impact given the amount of publicly avail… https://t.co/3xRyFd5KPZ https://twitter.com/i/web/status/1532421812155457536Marquart_DE
2022-06-02 17:30:21Regarding #Follina (CVE-2022-30190 / GSD-2022-30190) I think we need a special "affected versions" value of "YES". https://t.co/lA7NXK9eaykurtseifried
2022-06-02 17:20:09CVE-2022-30190 aka #Follina enables remote code execution with the same privileges in the calling application and t… https://t.co/Cn4qVbz4q7 https://twitter.com/i/web/status/1532409968963600392Unit42_Intel
2022-06-02 17:10:13Attention Windows users! There's a new critical remote code execution vulnerability called CVE-2022-30190 that's af… https://t.co/mSYMGJpke7 https://twitter.com/i/web/status/1532406751861121024elevity_it
2022-06-02 17:10:09Imagine getting hacked just by previewing a document file. No clicks are even required. #CVE-2022-30190 Crazy right. #securityRed0mar
2022-06-02 17:10:05.@FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The… https://t.co/9qPNkWBS4a https://twitter.com/i/web/status/1532408462436605953pclair13
2022-06-02 17:01:19What can you do to mitigate the scourge of #Follina, a/k/a CVE-2022-30190? Read up on the technical details, what t… https://t.co/5Hq9li4wJh https://twitter.com/i/web/status/1532404790868660235pondurance
2022-06-02 16:50:12Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/cuh55leOS3 #IT_securitynews https://www.itsecuritynews.info/zero-day-bug-exploited-by-attackers-via-macro-less-office-documents-cve-2022-30190/CyberSecDN
2022-06-02 16:50:06#FortiGuardLabs provides an analysis and assessment to date of CVE-2022-30190: MSDT RCE vulnerability “#Follina.”… https://t.co/V6cimCzZrk https://twitter.com/i/web/status/1532404071520473090FortiGuardLabs
2022-06-02 16:21:29my CVE-2022-30190 variant on virustotal going to upload a video soon... https://t.co/A9W4RCGe2omax_merp
2022-06-02 16:20:580 Detection on all AV... This variant on CVE-2022-30190 is a killer. https://t.co/kng0qQFtCvmax_merp
2022-06-02 16:10:42⚠️FOLLINA: CVE-2022-30190 Vídeo explicativo sobre la vulnerabilidad 0day que permite ejecución remota de comandos u… https://t.co/iGFJ7WMGdc https://twitter.com/i/web/status/1532392813106561025thegoodhackertv
2022-06-02 16:01:10finishing up on a CVE-2022-30190 variant.max_merp
2022-06-02 16:00:11#CERTUA warns of in-the-wild #cyberattacks on Ukrainian government exploiting CVE-2022-30190 aka #Follina and CVE-2… https://t.co/jC2VeRTt7z https://twitter.com/i/web/status/1532390787136249858SOC_Prime
2022-06-02 15:41:44🚨 MS Support Diagnostic Tool Vulnerability CVE-2022-30190 requires minimal interaction for an attack to occur. Le… https://t.co/YCtKn94s4K https://twitter.com/i/web/status/1532384056486273024Cymulateltd
2022-06-02 15:41:12⚠️FOLLINA: CVE-2022-30190 Vídeo explicativo sobre la vulnerabilidad 0day que permite ejecución remota de comandos u… https://t.co/u3nz0zO5rH https://twitter.com/i/web/status/1532385236083957761thegoodhackertv
2022-06-02 15:40:37Esta semana, Microsoft emitió la CVE-2022-30190 en relación con la vulnerabilidad de Zero Day identificada en la He… https://t.co/vv0FF8UgJP https://twitter.com/i/web/status/1532385562484740096yes_estaloca
2022-06-02 15:23:20CVE-2022-30190 BIG F TO MS LMFAOOODedLadd_
2022-06-02 15:22:51CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-02 15:11:29Microsoft has released workaround guidance to address a remote code execution (RCE) vulnerability — CVE-2022-30190,… https://t.co/uXCuV7rYYM https://twitter.com/i/web/status/1532378383186812929CompassITC
2022-06-02 15:05:54Additional CVE-2022-30190 / #Follina micropatches issued today for: - Windows Server 2012 - Windows Server 2012 R2… https://t.co/kAFm14k79o https://twitter.com/i/web/status/15323720294747504650patch
2022-06-02 15:05:00わかりやすくまとめていただいてる、Follinaの公式?ロゴ付きで Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog… https://t.co/CUNLBb6wGy https://twitter.com/i/web/status/1532372209217720321iejirok
2022-06-02 14:45:37While Microsoft hasn’t published a patch for the recent CVE-2022-30190 Office Remote Code Exploitation vulnerabilit… https://t.co/ItI3KwbCtJ https://twitter.com/i/web/status/1532369255542534146WhiteOakSec
2022-06-02 14:42:24CVE-2022-30190 https://t.co/JZ8xPQujtg https://www.youtube.com/watch?v=3ytqP1QvhUcMazen_Alomar
2022-06-02 14:42:07Thank you @Fortinet @FortiGuardLabs for the Early Share with @CyberAlliance Members: CVE-2022-30190: Microsoft Supp… https://t.co/6ozZZ00DpI https://twitter.com/i/web/status/1532367210961854464CyberAlliance
2022-06-02 14:40:22With yet another nasty zero-day ( CVE-2022-30190 | https://t.co/hZfnuoSAXg ) being exploited, here's a quick tip to… https://t.co/TrGtV4YbTJ https://lnkd.in/gCz6-mfb https://twitter.com/i/web/status/1532371243680137216michelroth
2022-06-02 14:38:30Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり | ニッチなPCゲーマーの環境構築Z https://t.co/hU7nlhACJ2 https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.htmlEtrangerVoyager
2022-06-02 14:23:04You can investigate the #Follina incident as a SOC analyst for free. We prepared a SIEM alert about CVE-2022-30190… https://t.co/YA3KepwdwP https://twitter.com/i/web/status/1532365870697168896LetsDefendIO
2022-06-02 14:00:42Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/yyRl0zSugm https://dy.si/191DEi2Jotape_VM
2022-06-02 13:52:10Now tht every security researcher is aware of MSDT 0Day CVE-2022-30190, I happen to see @_JohnHammond' excellent sc… https://t.co/TvMW5pFHiM https://twitter.com/i/web/status/1532357271589597184shoumikchandra
2022-06-02 13:51:47https://t.co/nTXV66w47v Doc Exploit Follina Ms-Msdt 0-Day CVE-2022-30190 | Alert 🔴 Every Windows Computer Got Hacked🔥 https://youtu.be/stYXsX5_dcYAtsiteSolutions
2022-06-02 13:30:22CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability Hier gehts zum Workaround: https://t.co/mt5FRzmCc4… https://t.co/r43L70yVTz https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ https://twitter.com/i/web/status/1532352405144317952sulfirmengruppe
2022-06-02 13:21:04CVE-2022-30190 looks fun and dumb at the same timem3wali_
2022-06-02 13:20:17Nouvelle alerte de sécurité Microsoft CVE-2022-30190 concernant l'exploitation d'une faille dans les dernières vers… https://t.co/aMhDGzGmJZ https://twitter.com/i/web/status/1532349730331688962edipoles_
2022-06-02 13:10:35#Microsoft recently disclosed CVE-2022-30190, a Microsoft Office #vulnerability. This vulnerability is a zero-click… https://t.co/0VHkHLQuzt https://twitter.com/i/web/status/1532346302004187142Inceptionsec
2022-06-02 13:10:29Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 2.3M (audience size) CVE-2022-0778: 600K CVE-2022-3063… https://t.co/PSz1RaXXKx https://twitter.com/i/web/status/1532346303589621761CVEtrends
2022-06-02 13:10:23https://t.co/XLfbySAiDk Coverage Advisory for CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) Remo… https://t.co/Q19PZqj1Xc https://securityboulevard.com/2022/06/coverage-advisory-for-cve-2022-30190-microsoft-windows-support-diagnostic-tool-msdt-remote-code-execution-vulnerability/ https://twitter.com/i/web/status/1532347087609810944netsecu
2022-06-02 13:10:06Unofficial patches for the 0-day vulnerability called Follina (CVE-2022-30190) https://t.co/HySLEAEkgz https://t.co/3wXAULK3ga https://www.reddit.com/r/hacking/comments/v2m8kw/unofficial_patches_for_the_0day_vulnerability/?utm_source=dlvr.it&utm_medium=twitterHackerSpyNet1
2022-06-02 13:01:36Die neue Schwachstelle CVE-2022-30190, auch #Follina genannt, ermöglicht den Exploit des Windows Support Diagnostic… https://t.co/xZjeYuSffH https://twitter.com/i/web/status/1532338770430803971Kaspersky_DACH
2022-06-02 13:01:23https://t.co/9JYGM3eqLB SECURITY ALERT:  Zero-Day Microsoft Support Diagnostic Tool Vulnerability CVE-2022-30190 En… https://t.co/ALbFVAH433 https://heimdalsecurity.com/blog/zero-day-microsoft-support-diagnostic-tool-vulnerability/ https://twitter.com/i/web/status/1532339792645701633netsecu
2022-06-02 13:00:37🚨 NEW: CVE-2022-30190 🚨 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. Sever… https://t.co/hpXFRLpmmQ https://twitter.com/i/web/status/1532342083335426048threatintelctr
2022-06-02 13:00:27I can't sleep from yesterday because of #Follina Vulnerabillity aka CVE-2022-30190. I can't remember exactly but l… https://t.co/G8DZoImYbs https://twitter.com/i/web/status/1532342981055119361LexiLominite
2022-06-02 12:36:30Thorough MSDT 0-Day CVE-2022-30190 POC 'Follina' https://t.co/xnliDTyRf7 #bugbounty, #computer, #cyber, #ethical,… https://t.co/SiwF4ldpTz https://ift.tt/mHfN9yz https://twitter.com/i/web/status/1532336829856456709Securitytemple
2022-06-02 12:23:40CVE-2022-30190のやちゅめぇ〜MOFU_M0FU
2022-06-02 12:21:32RCE à La Follina (CVE-2022-30190) #splunkBlogs https://t.co/UKzn4NFp0O https://www.splunk.com/en_us/blog/security/rce-la-follina-cve-2022-30190.htmlcgsaid
2022-06-02 12:11:33Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/JTwy1W53Hn https://piyolog.hatenadiary.jp/entry/2022/06/02/010119sakak9498
2022-06-02 12:11:02SECURITY ALERT:  Zero-Day Microsoft Support Diagnostic Tool Vulnerability CVE-2022-30190 Enables Remote Code Execut… https://t.co/AtVpVUzFdn https://twitter.com/i/web/status/1532333293852536833IT_securitynews
2022-06-02 12:02:50Coverage Advisory for CVE-2022-30190: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulner… https://t.co/TlqHXRQld0 https://twitter.com/i/web/status/1532330199500693506cipherstorm
2022-06-02 11:52:58Here is a new sample "VIP Invitation to Doha Expo" using #CVE-2022-30190 #Follina and #CobaltStrike:… https://t.co/9xNFoGTPaZ https://twitter.com/i/web/status/1532327565666529287joe4security
2022-06-02 11:50:51CVE-2022-30190 https://t.co/QbGtdKbWkU https://t3x.co.uk/?p=582johnebelcher
2022-06-02 11:44:52Excelente resumen de @SeguInfo sobre la vulnerabilidad CVE-2022-30190 (conocida como Follina) que afecta de forma g… https://t.co/3KGfUvDSx6 https://twitter.com/i/web/status/1532323803551760384hellisleiva
2022-06-02 11:40:55Follina (CVE-2022-30190): Eine Schwachstelle im MSDT https://t.co/NWcxKzXF2L http://de.itsecuritynews.info/follina-cve-2022-30190-eine-schwachstelle-im-msdt/securitynews_de
2022-06-02 11:40:29CVE-2022-30190 Exploit https://t.co/QbGtdKbWkU https://t3x.co.uk/?p=582johnebelcher
2022-06-02 11:21:49This is serious - Guidance for CVE-2022-30190 #Microsoft Support Diagnostic Tool #Vulnerability – Microsoft Securit… https://t.co/k0ggTTu8G9 https://twitter.com/i/web/status/1532320125050834944RMCholewa
2022-06-02 11:21:27ثغره CVE-2022-30190 تستهدف عده جهات في السعوديه تصل بالعاده عن طريق الايميل في ملف word الثغره خطيره جدا تعطي صلاح… https://t.co/Dbpfn5VQ78 https://twitter.com/i/web/status/1532320213504507913osamah_Alshaya
2022-06-02 10:50:38CVE-2022-30190 Detection Extended For Directory Traversal #Cybersecurity #security via https://t.co/eBW8Lmmpx7 https://t.co/ijPIMWpT8t http://twinybots.ch https://www.socinvestigation.com/cve-2022-30190-detection-extended-for-directory-traversal/StanleyEpstein
2022-06-02 10:40:27Atención: #Follina CVE-2022-30190, afecta a todas las versiones de Windows que reciban updates. El vector pueden s… https://t.co/AkxBxa9DIK https://twitter.com/i/web/status/1532310092938452992ESFERARED
2022-06-02 10:31:51Reporte de Vectores de Ejecucion además de Excell/Word/Office.. para #Follina CVE-2022-30190 . ADD HERE… https://t.co/T7fY88h6Ki https://twitter.com/i/web/status/1532306465960218624ESFERARED
2022-06-02 10:30:39Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/ZMtDuUca3P https://piyolog.hatenadiary.jp/entry/2022/06/02/010119matsuoka_UCWDjp
2022-06-02 10:20:49note to all trash publications - CVE-2022-30190 stopped being a zero day, considerably more than zero days agoSeven_Stones
2022-06-02 09:50:44Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/ZGKzKEkvb8 https://www.youtube.com/watch?v=dGCOhORNKRkGMashari
2022-06-02 09:40:16Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/Gm6CykXFLm https://t.co/GN8XstFWti #EN #Follina http://news.torii-security.fr/s/xvaasn https://www.youtube.com/watch?v=dGCOhORNKRkInfo2sec_Torii
2022-06-02 09:40:07Let's learn more about the newest exploit going around, Follina RCE - CVE-2022-30190. Joe Helle takes us through an… https://t.co/dJUsYd0pza https://twitter.com/i/web/status/1532294999550963713GMashari
2022-06-02 08:21:09🚨Microsoft OfficeのゼロデイFollinaを、中国関連グループTA413が盛んに悪用(CVE-2022-30190) ⚠️Hiveランサムウェアがコスタリカの公衆衛生当局を攻撃 🚔FluBotのテイクダウン:法… https://t.co/aiFzVvgcRb https://twitter.com/i/web/status/1532275163953508353MachinaRecord
2022-06-02 08:13:10Microsoft zeroday in MS Office CVE-2022-30190 MSDT Exploitation #cve #Microsoft #zeroday #penetesting… https://t.co/d42ywE6q6h https://twitter.com/i/web/status/1532069051232849921kryolite_secure
2022-06-02 08:06:03My new fav tweet: ℹ️ We have published a new FAQ regarding CVE-2022-30190 #Follina. https://t.co/EtqHX7p8Qc — Mal… https://t.co/y3WOmEEurr https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/06/faq-mitigating-microsoft-offices-follina-zero-day/ https://twitter.com/i/web/status/1532268414617767939Nihilisme10
2022-06-02 08:05:47Cette faille de Windows ouvre une porte dérobée aux pirates via Microsoft Word. CVE-2022-30190 "vulnérabilité MSDT… https://t.co/E8g7bzsfKt https://twitter.com/i/web/status/1532268476664004608argevise
2022-06-02 08:04:21CVE-2022-30190 Detection Extended For Directory Traversal Read Here: https://t.co/UvK9mTEHLY #cybersecurity… https://t.co/fWmk6qpNIe https://www.socinvestigation.com/cve-2022-30190-detection-extended-for-directory-traversal/ https://twitter.com/i/web/status/1532269258222145537Bala_hacky
2022-06-02 07:40:52Here is a blogpost by me and @BirkanEli analyzing Follina exploit https://t.co/ONrWs4cfS2 #Follina CVE-2022-30190 https://www.paloaltonetworks.com/blog/security-operations/prevention-hunting-and-playbooks-for-msdt-zero-day-cve-2022-30190/galdeleon
2022-06-02 07:31:11CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. https://t.co/UoPm4lqPnP https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30190eyeTSystems
2022-06-02 07:13:380patch Blog: Free Micropatches For "Follina" Microsoft Diagnostic Tool Remote Code Execution 0day (CVE-2022-30190) https://t.co/zaCuNDJgLw https://blog.0patch.com/2022/06/free-micropatches-for-follina-microsoft.htmlohhara_shiojiri
2022-06-02 07:11:11CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. (CVSS:0.0) (La… https://t.co/xATBsfoeAb https://twitter.com/i/web/status/1532258061628350466threatmeter
2022-06-02 07:00:51脅威に関する情報: CVE-2022-30190 − MSDTのコード実行脆弱性 https://t.co/iqEvUFcVCj https://unit42.paloaltonetworks.jp/cve-2022-30190-msdt-code-execution-vulnerability/ohhara_shiojiri
2022-06-02 07:00:11[CTI] Some increased actor activities are shown targeting Microsoft Windows (CVE-2022-30190) https://t.co/ly55tpOhB6 https://vuldb.com/?ctiid.200909vuldb
2022-06-02 06:41:14The latest update for #Elastic includes "Vulnerability summary: Follina, CVE-2022-30190" and "6 #cybersecurity must… https://t.co/ANjo3gC3PD https://twitter.com/i/web/status/1532244548465852416opsmatters_uk
2022-06-02 06:40:18【緊急!マイクロソフトサポート診断ツールに脆弱性!】 Microsoftサポート診断ツールにリモートコード実行が可能となる脆弱性(CVE-2022-30190)が存在。現時点修正プログラムはなく、同社のガイダンスにて緩和策を公表中… https://t.co/lbuzKUCeT7 https://twitter.com/i/web/status/1532249879183237120fukkei_cyber
2022-06-02 06:40:11Zranitelnost CVE-2022-30190 Follina je již aktivně zneužívána https://t.co/35bkoX4dzc https://www.itbiz.cz/zpravicky/zranitelnost-cve-2022-30190-follina-je-jiz-aktivne-zneuzivanaitbizcz
2022-06-02 06:14:09Cool explanation from @_JohnHammond of CVE-2022-30190 https://t.co/XZy4W5TnFX https://www.youtube.com/watch?v=dGCOhORNKRk&ab_channel=JohnHammondnotahades
2022-06-02 05:32:57Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/ODEqwiT2zf https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/jeanclaudebpro
2022-06-02 05:31:17Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/iqxbnvn700 https://piyolog.hatenadiary.jp/entry/2022/06/02/010119ohhara_shiojiri
2022-06-02 05:02:49Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた https://t.co/cGZyQRwWkG https://piyolog.hatenadiary.jp/entry/2022/06/02/010119st_mouton
2022-06-02 05:02:05The latest update for #Netskope includes "CVE-2022-30190: New Zero-Day Vulnerability (Follina) in Microsoft Support… https://t.co/PRztVTuPF1 https://twitter.com/i/web/status/1532224519510933504opsmatters_uk
2022-06-02 05:00:34What is CVE-2022-30190 ? What are the threats and workarounds to overcome this vulnerability ? Let`s understand as… https://t.co/I3gt7QeSjk https://twitter.com/i/web/status/1532225420883419136YagneshMalaviya
2022-06-02 04:40:52Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/CjgDJrbSlY https://piyolog.hatenadiary.jp/entry/2022/06/02/010119koto_chan
2022-06-02 04:34:51Officeにゼロデイ脆弱性(CVE-2022-30190)が発覚、Microsoftは緩和策を公開。現時点で修正パッチは未提供 https://t.co/ztwGeF8Jv1 https://enjoypclife.net/microsoft-office-zero-day-cve-2022-30190-follina/enjoypclife
2022-06-02 04:31:46Having some fun with CVE-2022-30190 exploit in Kali Linux :) For more information about the new windows CVE here's… https://t.co/8L1ALWIXGj https://twitter.com/i/web/status/1532217380801216514ItsTheRealCorey
2022-06-02 04:21:53Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり | ニッチなPCゲーマーの環境構築Z https://t.co/l4o05LhiNm https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.htmlakibablog
2022-06-02 04:00:43The latest update for #Splunk includes "RCE à La Follina (CVE-2022-30190)" and "Publish Your Splunk #SOAR Apps Fast… https://t.co/xwLbcZs5VD https://twitter.com/i/web/status/1532209566292877312opsmatters_uk
2022-06-02 03:41:27CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina” - https://t.co/x6yXwDMjes https://www.fortinet.com/blog/threat-research/analysis-of-follina-zero-dayka0com
2022-06-02 03:40:44Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability https://t.co/y4ex754xnW https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/PVynckier
2022-06-02 03:30:300-day [CVE-2022-30190] MS Offic RCE aka msdt follina Malicious Document SHA256 - 4a24048f81afbe9fb62e7a6a49adbd1faf… https://t.co/TrZzhn9IgO https://twitter.com/i/web/status/1532200557552844801YunusHuseyinY15
2022-06-02 03:30:09Microsoft Office远程代码执行漏洞(CVE-2022-30190),目前在开源代码平台已存在该漏洞的验证代码。攻击者可利用恶意Office文件中的远程模板功能从远程网络服务器获取恶意HTML文件,通过微软支持诊断工具… https://t.co/tvDVJwShMm https://twitter.com/i/web/status/1532202785302667264KeystoneCN
2022-06-02 03:20:16[CVE-2022-30190] MS Offic RCE aka msdt follina is 1. not detected as malicious by some EDR, like Microsoft Defende… https://t.co/FT4Sy3x5JD https://twitter.com/i/web/status/1532200066634633216YunusHuseyinY15
2022-06-02 03:00:46Officeに未修正のゼロデイ脆弱性 Microsoftは回避策を公開 Microsoftは5月30日、Windowsのゼロデイ・ゼロクリック脆弱性に関する共通脆弱性識別子「CVE-2022-30190」を発行。まずは回避策公開… https://t.co/Irknj7f2x9 https://twitter.com/i/web/status/1532195301229879297moveitAcronet
2022-06-02 02:53:21CVE-2022-30190くらいは検証しとこうかmorimolymoly
2022-06-02 02:46:120-day [CVE-2022-30190] MS Offic RCE aka msdt follina Target = "http://<payload_server>/payload.html!" TargetMode =… https://t.co/KioVZbs825 https://twitter.com/i/web/status/1532189210425577472wugeej
2022-06-02 02:45:41[CVE-2022-30190] MS Offic RCE aka msdt follina is 1. not detected as malicious by some EDR, like Microsoft Defende… https://t.co/jUVLpJE6ND https://twitter.com/i/web/status/1532189212979924993wugeej
2022-06-02 02:45:000-day [CVE-2022-30190] MS Offic RCE aka msdt follina Malicious Document SHA256 - 4a24048f81afbe9fb62e7a6a49adbd1faf… https://t.co/3HHm5qtO9K https://twitter.com/i/web/status/1532189214950903808wugeej
2022-06-02 02:41:51CVE-2022-30190: New Zero-Day Vulnerability (Follina) in Microsoft Support Diagnostic Tool - Netskope https://t.co/rdDpoob2Dv https://www.netskope.com/blog/cve-2022-30190-new-zero-day-vulnerability-follina-in-microsoft-support-diagnostic-toolmoton
2022-06-02 02:33:11Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) - https://t.co/h9XCgustMN -… https://t.co/TbIKTLsWcY https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/ https://twitter.com/i/web/status/1532185995302543361bestavbyssg
2022-06-02 02:21:55"Fortinet Threat Research Blog": CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follin… https://t.co/IcmfVo5pJN https://twitter.com/i/web/status/1532184047706853383FINSIN_CL
2022-06-02 02:20:59[Recomendado]CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina”… https://t.co/gPpGzEs0r7 https://twitter.com/i/web/status/1532184983091167233seguridad_si
2022-06-02 02:02:54CVE-2022-30190 detection added successfully https://t.co/cXlAmlMOxN https://twitter.com/0xmaz/status/15251834350647255050xMaz
2022-06-02 02:02:14Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/wLdyr4kCGL https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/Syynya
2022-06-02 01:41:58CVE-2022-30190 can be detected by searching for cases when "WINWORD.EXE" start "msdt.exe" as child process. In ano… https://t.co/nJe34apnD0 https://twitter.com/i/web/status/15321734394900029460xMaz
2022-06-02 01:40:39#Follina CVE-2022-30190 Name: VIP Invitation to Doha Expo 2023.docx Submitted: 2022-06-01 URL: https://files.attend… https://t.co/GSjhtM4vRt https://twitter.com/i/web/status/1532174278212599808StopMalvertisin
2022-06-02 01:22:05マイクロソフト・オフィスに安全面の問題発見。フォリーナと命🧐CVE-2022-30190 。Office 2013, 2016, 2019, 2021, Office ProPlus, and Office 365で影響。Mojakats
2022-06-02 01:21:17#Follina CVE-2022-30190 Name: VIP Invitation to Doha Expo 2023.docx Submitted: 2022-06-01 https://files.attend-doha… https://t.co/19atFCdAHD https://twitter.com/i/web/status/1532168827190247429StopMalvertisin
2022-06-02 01:00:29Looks like you can abuse Windows search URI handling via Office Docs in a similar way to CVE-2022-30190 with msdt.… https://t.co/ZFSYRZFy9C https://twitter.com/i/web/status/1532162663656132610sloppy_bear
2022-06-02 00:52:55A good and 'not-so-dry' overview of Follina 0-day (CVE-2022-30190) from @_JohnHammond https://t.co/N6i7rcVlnW https://www.youtube.com/watch?v=dGCOhORNKRknainsandeep
2022-06-02 00:52:44夜行性インコさんのまとめ。例のMSDT脆弱性について。まずはレジストリで無効化でしょうかねぇ:Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/C7fbhNhMFA https://itnews.org/news_resources/318914tamosan
2022-06-02 00:40:44Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/L2WIEI8V7D https://piyolog.hatenadiary.jp/entry/2022/06/02/010119kit1t
2022-06-02 00:31:131件のコメント https://t.co/ADNXyfWkCd “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog” https://t.co/6y23lSfPVo https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2022/06/02/010119#utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/43TUUKnjiymiso_log
2022-06-02 00:30:35マクロ無効化してるから怪しい添付開いてもヨシ!からのウイルス蔓延がありうるのか / 2件のコメント https://t.co/ADNXygdnEd “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190)… https://t.co/gwVPqofen0 https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2022/06/02/010119#utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1532157033234849793miso_log
2022-06-02 00:30:24マクロ無効化されてるから怪しい添付開いてもヨシ!からのウイルス蔓延がありうるのか / 2件のコメント https://t.co/ADNXyfWkCd “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190… https://t.co/N4mPL43EjY https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2022/06/02/010119#utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1532157106899800064miso_log
2022-06-02 00:20:29[Video] VDB-200909 provides a video illustrating CVE-2022-30190 https://t.co/8d5l5eGQDH https://youtu.be/dGCOhORNKRkvuldb
2022-06-02 00:10:30Hi, I'm CVE-2022-30190. I was never good with numbers though, so you can call me Moist Serpent https://t.co/fTGosYs06M https://nvd.nist.gov/vuln/detail/CVE-2022-30190vulnonym
2022-06-02 00:03:04Unofficial patches for the 0-day vulnerability called Follina (CVE-2022-30190) https://t.co/pfSS2mgiIX _r_netsec https://blog.0patch.com/2022/06/free-micropatches-for-follina-microsoft.htmlbeingsheerazali
2022-06-02 00:01:49NetorkChuckさんとJohnHammondさんによるCVE-2022-30190の動画だ! https://t.co/9e0hTEmyGN https://twitter.com/NetworkChuck/status/1532071090335666177MASAbirokou
2022-06-02 00:01:17Follina ZeroDay Aka CVE-2022-30190 Currently has no known solution Meaning... If you accidentally open the wrong… https://t.co/Wi4NaqlUPb https://twitter.com/i/web/status/1532146792749490176pi42449346
2022-06-02 00:00:18Follina ZeroDay Aka CVE-2022-30190 Currently has no known solution Meaning... If you accidentally open the wrong… https://t.co/2BzK1c2FFC https://twitter.com/i/web/status/1532148923413970946CSA_DVillamizar
2022-06-01 23:35:54CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. (CVSS:0.0) (La… https://t.co/lOY1aOZ9kZ https://twitter.com/i/web/status/1532142162686664704threatmeter
2022-06-01 23:29:35【速報】 Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/A0a74UXPh6 http://dlvr.it/SRSfTlsebubot
2022-06-01 23:23:430Patch Micro patch against Follina vulnerability (CVE-2022-30190) in Windows https://t.co/dH50nDKC07 #patch… https://t.co/hh1sT59gDB https://borncity.com/win/?p=24716 https://twitter.com/i/web/status/1532139486599069696etguenni
2022-06-01 23:03:53脅威に関する情報: CVE-2022-30190 − MSDTのコード実行脆弱性 https://t.co/cjuFCJ0jKf https://ift.tt/53LuhB7magiauk
2022-06-01 23:02:43Potentially Critical CVE Detected! CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Exec… https://t.co/ok3UMyx5au https://twitter.com/i/web/status/1532133876591693824Robo_Alerts
2022-06-01 22:53:49見てる: 「ms-msdt:/」 "Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog" https://t.co/BaWCvmLJOw https://piyolog.hatenadiary.jp/entry/2022/06/02/010119azu_re
2022-06-01 22:52:07CVE-2022-30190 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. https://t.co/gfMLP2KYy2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30190CVEnew
2022-06-01 22:50:57#Follina 👻 شرح أكثر من رائع من جون هامند عن ثغرة CVE-2022-30190 🔥👏👏 إمكانية التهكير عن طريق ملف وورد -فولينا- https://t.co/CGyHF41z2h https://twitter.com/_JohnHammond/status/1531549763191152640Jolys_Tech
2022-06-01 22:42:030Patch Micro-Patch gegen Follina-Schwachstelle (CVE-2022-30190) in Windows https://t.co/05McUJWhmF #Patch… https://t.co/VCcO16S5TD https://www.borncity.com/blog/2022/06/02/0patch-micro-patch-gegen-follina-schwachstelle-cve-2022-30190-in-windows/ https://twitter.com/i/web/status/1532128499036835848etguenni
2022-06-01 22:40:24Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた https://t.co/XVwqkW6Upo まぁまぁやべぇな。 https://piyolog.hatenadiary.jp/entry/2022/06/02/010119yosilove
2022-06-01 22:32:48CVE-2022-30190 - Security Update Guide - Microsoft - Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code E… https://t.co/o7nqwCazmh https://twitter.com/i/web/status/1532125848718807040pueblokc
2022-06-01 22:22:211件のコメント https://t.co/QVO0yrN0KO “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog” https://t.co/WnovGavLbH https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2022/06/02/010119#utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20Microsoft https://htn.to/4tRA5ohFxptukanana
2022-06-01 22:16:00Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/51Q0pz5azm via @YouTube https://youtu.be/dGCOhORNKRklordokeson1
2022-06-01 22:14:11Could something like CVE-2022-30190 be done with WindowsUpdateDiagnostic with the Get-TroubleshootingPack param? Just a Q.Speer_Hacks
2022-06-01 22:11:00“脅威に関する情報: CVE-2022-30190 − MSDTのコード実行脆弱性” https://t.co/UvtFMLUUeH https://htn.to/CXAqkxkXJimodokey
2022-06-01 22:02:15Follina vulnerabilitiy (CVE-2022-30190): Status, Findings, Warnings & Attacks https://t.co/x8E5LR00CX #Office… https://t.co/Zgat8L068i https://borncity.com/win/?p=24714 https://twitter.com/i/web/status/1532118017131307008etguenni
2022-06-01 21:41:04> Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/1kIVlLR0pM http://dlvr.it/SRSSnWPaulomorgadoN
2022-06-01 21:32:09Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/Kpwza67F6Z https://piyolog.hatenadiary.jp/entry/2022/06/02/010119tethys_seesaa
2022-06-01 21:31:47CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/SmNxpyzNXp https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/ntsuji
2022-06-01 21:31:37CVE-2022-30190 - Security Update Guide - Microsoft - Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code E… https://t.co/c5kws37yoI https://twitter.com/i/web/status/1532111568095551489ntsuji
2022-06-01 21:26:05🚨 NEW: CVE-2022-30190 🚨 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. Sever… https://t.co/EgGnAleYdZ https://twitter.com/i/web/status/1532108039033176064threatintelctr
2022-06-01 21:10:57@OrdinaryGamers hey muta will you cover CVE-2022-30190liamg_uk
2022-06-01 21:02:38「中国にリンクされたAPTグループTA413は、Microsoft Officeで最近公開されたFollinaのゼロデイ欠陥( CVE-2022-30190として追跡され 、CVSSスコア7.8と評価された)を悪用していることが… https://t.co/rdTHYQm81j https://twitter.com/i/web/status/1532103532916027393foxbook
2022-06-01 20:55:21Microsoft releases workaround to address a remote code execution (#RCE) vulnerability CVE-2022-30190; REMOTE UNAUTH… https://t.co/JtJ0R1D0sL https://twitter.com/i/web/status/1532100872653754374OhioCyber
2022-06-01 20:30:33Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/L7sqrSWqHd https://piyolog.hatenadiary.jp/entry/2022/06/02/010119mukidayo
2022-06-01 20:30:09[CTI] Some increased actor activities are shown targeting Microsoft Office (CVE-2022-30190) https://t.co/ly55tpOhB6 https://vuldb.com/?ctiid.200909vuldb
2022-06-01 20:21:40Find Arctic Wolf's recommendations for CVE-2022-30190. https://t.co/80T1ERAAHl #EndCyberRisk http://ow.ly/TQim50JmycbAWNetworks
2022-06-01 20:20:36CVE-2022-30190 : Microsoft #Windows Support Diagnostic Tool MSDT Remote Code Execution Vulnerability.... https://t.co/I2zaGGL1GS https://cve.report/CVE-2022-30190CVEreport
2022-06-01 20:07:51CVE-2022-30190: Zero Click Zero Day in Microsoft Support Diagnostic Tool Exploited in the Wild https://t.co/e5C52QnsAR http://ow.ly/rI0i103HYPaJTelly
2022-06-01 20:04:49@cyb3rops @MalwareJake @pseudonyme_ovb It's up to MS to define what they want CVE-2022-30190 to be. But I predict i… https://t.co/GnyhT9jMxa https://twitter.com/i/web/status/1532088351557287937wdormann
2022-06-01 20:02:09CVE-2022-30190: Zero Click Zero Day in Microsoft Support Diagnostic Tool Exploited in the Wild https://t.co/dHQmHmUfn5 http://ow.ly/fFOR103HYPxJTelly
2022-06-01 19:46:25@MalwareJake But just to be clear, the screenshot that implies that it's an exploit for CVE-2022-30190 shows no evi… https://t.co/JQSosDJiZG https://twitter.com/i/web/status/1532083228412203008wdormann
2022-06-01 19:37:17Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/1c8DSy9BxA https://piyolog.hatenadiary.jp/entry/2022/06/02/010119orenoshio
2022-06-01 19:30:31@BaoshengbinCumt What makes this CVE-2022-30190 ? Without knowing what the HTML file contained, you won't be able t… https://t.co/bHHjdZCeYs https://twitter.com/i/web/status/1532081945382948864wdormann
2022-06-01 19:23:50Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/LqQpEQT1gF #Microsoft… https://t.co/oIxQFRbZWP https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ https://twitter.com/i/web/status/1532078147193143304js_nyc
2022-06-01 19:12:41Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/uefdOjw2E3 https://piyolog.hatenadiary.jp/entry/2022/06/02/010119totoroneo
2022-06-01 19:10:34Unpatched Zero-Day CVE-2022-30190 https://t.co/5RCSdl3s9R https://youtu.be/3ytqP1QvhUcnxtexploit
2022-06-01 18:58:21Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/wdBXOYva8t https://piyolog.hatenadiary.jp/entry/2022/06/02/010119it_hatebu
2022-06-01 18:48:38Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/1myaTmKezu https://shoppeybd.com/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/SHOPPEY_BD
2022-06-01 18:47:29Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability: https://t.co/O2PnU9CAt0 #microsoft… https://t.co/pgkA6wrFhz https://lnkd.in/e-phnAps https://twitter.com/i/web/status/1532067187556462592cyberarchconsul
2022-06-01 18:43:31📍Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog #相互フォロー #拡散希望 【出所:はてなブックマーク /… https://t.co/Tk4JY2tZAc https://twitter.com/i/web/status/1532068313370464257ChoNewsHDK
2022-06-01 18:41:18Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/J31hZCA1K5 https://piyolog.hatenadiary.jp/entry/2022/06/02/010119sutest1101
2022-06-01 18:34:23Error de día cero explotado por atacantes a través de documentos de Office sin macros (CVE-2022-30190).Más informac… https://t.co/LesoNTDwU6 https://twitter.com/i/web/status/1532064540011417600Tecnovan
2022-06-01 18:33:19CVE-2022-30190 https://t.co/UKQQ6gs6JW #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-01 18:32:27、、、 / “Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog” https://t.co/8FrhSJGEwb https://htn.to/3i9quHqpc9toshi_miura
2022-06-01 18:32:19Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/1myaTmKezu https://shoppeybd.com/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/SHOPPEY_BD
2022-06-01 18:21:03Read my threat #intel report on @Microsoft's CVE-2022-30190 #RCE #vulnerbility #Follina https://t.co/Ygq7GMw4nJ https://twitter.com/deepwatch_sec/status/1531757408531496960ericWadeFord
2022-06-01 18:15:27Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/1myaTmKezu https://shoppeybd.com/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/SHOPPEY_BD
2022-06-01 18:13:56Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/dIg9YCx2Ic @YouTubeより https://youtu.be/dGCOhORNKRkkatabame
2022-06-01 18:04:30Unofficial patches for the 0-day vulnerability called Follina (CVE-2022-30190) https://t.co/9mFhN6g72s https://news.digitalskeleton.com.ng/threads/unofficial-patches-for-the-0-day-vulnerability-called-follina-cve-2022-30190.27300/CEOofDSS
2022-06-01 18:00:33Unofficial patches for the 0-day vulnerability called Follina (CVE-2022-30190) via /r/netsec… https://t.co/IX60syqi3b https://twitter.com/i/web/status/1532059271575523329CybrXx0
2022-06-01 17:50:29New post: "Unofficial patches for the 0-day vulnerability called Follina (CVE-2022-30190)" https://t.co/zBo3SEHLRa https://ift.tt/EQhVmfCMyinfosecfeed
2022-06-01 17:33:45#CVE-2022-30190 aka #Follina – an #RCE vulnerability in Microsoft Tool (MSDT). Detect attacks against your infrastr… https://t.co/mUUNWSxL4F https://twitter.com/i/web/status/1532049715759562753Cyber_Cave_sa
2022-06-01 17:32:33Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability: https://t.co/hhi2GFIaJ4 #microsoft… https://t.co/wChm4PXll9 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ https://twitter.com/i/web/status/1532050825190723584blackstormsecbr
2022-06-01 17:31:38Unofficial patches for the 0-day vulnerability called Follina (CVE-2022-30190) https://t.co/8iNOXgIrux https://blog.0patch.com/2022/06/free-micropatches-for-follina-microsoft.html_r_netsec
2022-06-01 17:30:31Let's learn more about the newest exploit going around, Follina RCE - CVE-2022-30190. Joe Helle takes us through a… https://t.co/yMQDYHGO8F https://twitter.com/i/web/status/1532051776651788293TCMSecurity
2022-06-01 17:20:27انتشار استغلال ثغرة #CVE-2022-30190 والمعروفة ب #Follina وهي ثغرة تسمح بالتحكم والسيطرة عن بعد، و #تستهدف بعض الادو… https://t.co/GufDVPZrTE https://twitter.com/i/web/status/1532049184236482565Cyber_Cave_sa
2022-06-01 17:11:29Technical Tip: Learn how #FortiEDR protects against CVE-2022-30190 ‘Follina’ Microsoft Office protocol vulnerabilit… https://t.co/EuM0GdZmlP https://twitter.com/i/web/status/1532045451675017221FortiGuardLabs
2022-06-01 17:03:10ℹ️ We have published a new FAQ regarding CVE-2022-30190 #Follina. https://t.co/TZAR4SgNpI https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/06/faq-mitigating-microsoft-offices-follina-zero-day/MBThreatIntel
2022-06-01 17:02:51Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/ww3Uiaic0k https://ift.tt/bPn4oiZmagiauk
2022-06-01 17:01:38Vulnerability summary: Follina, CVE-2022-30190 https://t.co/jHL0XrzvFL https://ift.tt/oKBs04Csoftwarenews42
2022-06-01 17:00:15@ObscurelyNikki was this CVE-2022-30190, known as "Follina"—affecting the Microsoft Support Diagnostic Tool (MSDT) in Windows?justindignation
2022-06-01 16:51:10"VIP Invitation to Doha Expo 2023.rar" -> CVE-2022-30190 -> (WebDAV) -> CobaltStrike https://t.co/kPdvmN8KmQ https://app.any.run/tasks/cce48a5e-2a9b-4aeb-abb4-f77ea78a28ccnao_sec
2022-06-01 16:41:23Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) - https://t.co/Bbk8jlm6QT -… https://t.co/05t8WYHrSH https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/ https://twitter.com/i/web/status/1532036824843026432helpnetsecurity
2022-06-01 16:40:25CVE-2022-30190 aka #Follina has potential to be of high impact given the amount of publicly available information,… https://t.co/xuErCxi9rw https://twitter.com/i/web/status/1532038802239279104iamdamiend
2022-06-01 16:30:57#Follina (CVE-2022-30190) detection tips : Do not rely only on sdiagnhost.exe suspicious child process creation msd… https://t.co/cfytYAQqqm https://twitter.com/i/web/status/1532034964434432002MaD_c4t
2022-06-01 16:30:12#Follina CVE-2022-30190: #ENISA advises to implement the #eusirtsnetwork members alerts asap. For the CSIRT's Netw… https://t.co/xphunyXI2n https://twitter.com/i/web/status/1532036574472544257enisa_eu
2022-06-01 16:22:01はてなブログに投稿しました #はてなブログ Microsoft サポート診断ツールの脆弱性 (CVE-2022-30190) についてまとめてみた - piyolog https://t.co/2HJeCKczjD https://piyolog.hatenadiary.jp/entry/2022/06/02/010119piyokango
2022-06-01 16:21:02CVE-2022-30190 MSDT: Workaround for Microsoft Support Diagnostic Tool Vulnerability https://t.co/1YLMzz9dE6 https://techdirectarchive.com/2022/06/01/cve-2022-30190-msdt-workaround-for-microsoft-support-diagnostic-tool-vulnerability/TechDArchive
2022-06-01 16:20:29The vendor @0patch has released their own patch for Follina (CVE-2022-30190). https://t.co/WqFBSw6hW7 https://twitter.com/bleepincomputer/status/1532022110926798852FrankMcG
2022-06-01 16:16:00On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in W… https://t.co/0f1USrqOQr https://twitter.com/i/web/status/1532031526803673088RRalstonAgile
2022-06-01 16:01:39Correction d'un problème d'indentation dans la règle Sigma CVE-2022-30190_2CERT_FR
2022-06-01 16:01:05Follina workaround zero-day microsoft CVE-2022-30190 #zeroday #microsoft #vulnerabilities #security https://t.co/pQOp3FC6Yf https://lnkd.in/dBdYTw4Zandbonom
2022-06-01 15:50:35Para mitigar Follina (CVE-2022-30190) en redes a través de GPO (en español), esto parece funcionar: Deshabilita: Co… https://t.co/gNUT95hoYJ https://twitter.com/i/web/status/1532026655530688512ssantosv
2022-06-01 15:49:31New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) - SANS Internet Storm Center  https://t.co/I6Ek8Fk3qj https://buff.ly/3GBTpFQlordman1982
2022-06-01 15:46:49شوف CVE-2022-30190llmuk12
2022-06-01 15:45:54Vulnerabilidad Follina (CVE-2022-30190) https://t.co/NLdL8Z9ILi https://twitter.com/weareDMNTRs/status/1531299889149362177weareDMNTRs
2022-06-01 15:29:50Follina -- Exploiting MS-MSDT 0-Day CVE-2022-30190 | Alert! Everyone Windows Hacked #pentestblog #windowshacking… https://t.co/8SCAU7b1VM https://twitter.com/i/web/status/1532016702711508992pentestblogin
2022-06-01 15:22:09Threat Snapshot on this coming out tomorrow, sharing what the #Follina attack graph looks like CVE-2022-30190 Subs… https://t.co/GR7Q3DUs9Y https://twitter.com/i/web/status/1532019038116790273FryGuy2600
2022-06-01 15:18:33CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-06-01 15:03:42🚨 Important : découvrez comment traiter la CVE-2022-30190 #Follina liée à Microsoft Support Diagnostic Tool (MSDT)… https://t.co/ZoOzp3pMiF https://twitter.com/i/web/status/1532012846296489985cyberwatch
2022-06-01 15:00:40Exploiting MSDT 0 day CVE-2022-30190 https://t.co/DinHkW6kDh https://bit.ly/38CD8nwinfosecsocial
2022-06-01 14:47:14Free Micropatches For "Follina" Microsoft Diagnostic Tool Remote Code Execution 0day (CVE-2022-30190) #Follina… https://t.co/bpUonBZo7p https://twitter.com/i/web/status/15320066272257843230patch
2022-06-01 14:44:46Warning – Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability CVE-2022-30190 (a.k.… https://t.co/7EVmK1jYRv https://twitter.com/i/web/status/1532007617043873794joel_dpa
2022-06-01 14:01:47⚠️Alerte CERT-FR⚠️ Mise à jour de l'alerte CERTFR-2022-ALE-005 concernant la vulnérabilité CVE-2022-30190 affectan… https://t.co/j1TLiyFyLq https://twitter.com/i/web/status/1531997803420995584CERT_FR
2022-06-01 13:53:11Follina-Schwachstelle: Schadcode wird per Microsoft Office eingeschleust (CVE-2022-30190) - IT-Bedrohungslage 3/ora… https://t.co/VS0qXrzgD1 https://twitter.com/i/web/status/1531994861565423616rzUniFR
2022-06-01 13:53:00Blog on how to replicate the new CVE-2022-30190 using the POC provided by @_JohnHammond #0Day #exploitation… https://t.co/K2n97dMNP9 https://twitter.com/i/web/status/1531994942888759296Far_Sid17
2022-06-01 13:50:09⚠️ SECURITY ADVISORY [MICROSOFT OFFICE] Microsoft Office zero-day flaw. CVE-2022-30190 is a zero-day vulnerability… https://t.co/e1DRlkWmWp https://twitter.com/i/web/status/1531995997009854465Broadleaf_Group
2022-06-01 13:40:17Threat Brief: CVE-2022-30190 https://t.co/9PZ3trwakI https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/Chris_IRM
2022-06-01 13:30:15⚠️ Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center… https://t.co/mPYFI5IwXc https://twitter.com/i/web/status/1531991032270921729TomekTR
2022-06-01 13:22:09@msftsecurity Re: "CVE-2022-30190", is the HKCR registry mod the only option that works, or does applying the GPO "… https://t.co/pJbJ0BpIPm https://twitter.com/i/web/status/1531981441835360258fahids5
2022-06-01 13:22:06So this week's Windows vulnerability panic is Follina - CVE-2022-30190. Just in time for the bank holiday weekend t… https://t.co/ca1btlxETs https://twitter.com/i/web/status/1531982175163260928BenGreystone
2022-06-01 13:21:55Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 5.8M (audience size) CVE-2022-29464: 408.5K CVE-2021-4… https://t.co/n2fyNcauLz https://twitter.com/i/web/status/1531983919293267996CVEtrends
2022-06-01 13:21:36📢 Ante la gravedad y fácil explotación de la vulnerabilidad CVE-2022-30190 del protocolo MS-MSDT (Microsoft Windows… https://t.co/Tee1bRzOzZ https://twitter.com/i/web/status/1531985258660474883elhackernet
2022-06-01 13:21:22Cyble discusses a Zero-Day Exploit of the MSDT Vulnerability CVE-2022-30190, how it can be exploited, and some work… https://t.co/Sxzb0ODKa2 https://twitter.com/i/web/status/1531986528419074048catnap707
2022-06-01 13:21:15Unsere MSDT / CVE-2022-30190 response. https://t.co/VZNqFpoMpBkgbvax
2022-06-01 13:21:03Released 0day in Microsoft Office CVE-2022-30190 (Follina) Be careful 🤞 #risk #infosec #cybersecurity #pentesting… https://t.co/nMpDoJHw13 https://twitter.com/i/web/status/1531986956242014208zerotrust0
2022-06-01 13:20:22Microsoft has released workaround guidance to address a remote code execution (RCE) vulnerability—CVE-2022-30190, k… https://t.co/45DzrpPpZr https://twitter.com/i/web/status/1531988245252218880dennis_linux
2022-06-01 13:20:15Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/RDEuqtSYy0 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/JParticle0
2022-06-01 12:55:00Follina(CVE-2022-30190)、対策取ってなくて引っかかるユーザ結構出てきそうなyorunekonya
2022-06-01 12:51:15Follina MSDT Zero-Day Targets MS Word In Only One Click - CVE-2022-30190 https://t.co/LNzOtK7XFa #bugbounty,… https://t.co/W6I83asbDF https://ift.tt/ED3dyjq https://twitter.com/i/web/status/1531976378421325824Securitytemple
2022-06-01 12:50:37MSDTの脆弱性色々試してみたけどどうしてこんなこと起こるか不思議だね CVE-2022-30190VisualBasist
2022-06-01 12:46:29Replicated the MSDT 0-Day CVE-2022-30190 using @_JohnHammond POC. Thanks for this John😄 #0Day #Microsoft… https://t.co/iYT7AN13Tf https://twitter.com/i/web/status/1531977441933000704Far_Sid17
2022-06-01 12:41:51another ITW sample of CVE-2022-30190 (Follina) was uploaded to VirusTotal today from Saudi Arabia: sha1: 9253df019b… https://t.co/8FBaoK6CAb https://twitter.com/i/web/status/1531978838019821570alexey_firsh
2022-06-01 12:29:56👀 - CVE-2022-30190: https://t.co/HbC3ribf3v - Public reporting: https://t.co/njUCxoBmfj https://t.co/M6iEznNRun https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190 https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-mitigation-for-office-zero-day-exploited-in-attacks/ https://twitter.com/wallet_guard/status/1531848479911432192pcaversaccio
2022-06-01 12:28:00A pesar de que se intentó bloquear la vulnerabilidad CVE-2022-30190 ms-msdt ya se integró a IOS y no hay antivirus… https://t.co/HPlNsGvpkq https://twitter.com/i/web/status/1531972038675546113Ranitomeyacc
2022-06-01 12:23:25Microsoft Office CVE-2022-30190 #follina vulnerability / please patch as fast as possible #microsoftsecurity https://t.co/kAMoFzGbag https://lnkd.in/ejk3JWc8dfend_it
2022-06-01 12:15:30-> Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability: https://t.co/LSQAFNzsjE #Follina… https://t.co/YPLA1iSeod https://lnkd.in/dKf-PH2Y https://twitter.com/i/web/status/1531969606038212609InfosecMonk
2022-06-01 12:04:05Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり | ニッチなPCゲーマーの環境構築Z https://t.co/J6aOA5WP4p https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.htmlsassouev
2022-06-01 11:53:03CVE-2022-30190: Zero Click Zero Day in Microsoft Support Diagnostic Tool Exploited in the Wild https://t.co/wHiNzHaEPv http://ow.ly/nEKq103HVPgBernard_Montel
2022-06-01 11:50:22@UK_Daniel_Card, What's your advice for CVE-2022-30190? Have a customer asking what's the best way to protect again… https://t.co/IoPC6oaaHZ https://twitter.com/i/web/status/1531965567011266567smoon_lee
2022-06-01 11:43:17皆さん、お疲れ様でした。 お仕事終了です。😌 細工されたWordファイル文書ファイルを開いただけで悪意あるコードが実行されるゼロデイ脆弱性 CVE-2022-30190 など、色々と危険なものがまた出てきており、対応してました。… https://t.co/OQ3Y5cNj8I https://twitter.com/i/web/status/1531962588619079681VELO_ch
2022-06-01 11:42:57Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり https://t.co/xc2RyJ70yX https://bit.ly/38W9Xw7kuniomamoru
2022-06-01 11:41:54Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability #0day https://t.co/BZu3eFfU5r https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/bebinjo
2022-06-01 11:11:47Bitdefender on "Follina" - CVE-2022-30190 Zero-day Vulnerability in Microsoft Support Diagnostic Tool #microsoft… https://t.co/EBUJcNd23g https://twitter.com/i/web/status/1531955162490675200maikosv
2022-06-01 10:44:41CVE-2022-30190 poc MSDT RCE Follina 0day https://t.co/s5S8Cbmlis https://www.ddosi.org/cve-2022-30190-poc/gov_hack
2022-06-01 10:44:10Veo titulares sobre el tema "Vulnerabilidad en Word" pero el fallo CVE-2022-30190 (Follina) no creo que ya se pueda… https://t.co/3vzktqbUUC https://twitter.com/i/web/status/1531947095455932418ssantosv
2022-06-01 10:21:53CVE-2022-30190: Zero Click Zero Day in Microsoft Support Diagnostic Tool Exploited in the Wild https://t.co/97GzS9HHyt http://ow.ly/mPc6103HU20Art_Capella
2022-06-01 10:20:46Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool RCE #vulnerability that exists when… https://t.co/YAASzQoOuu https://twitter.com/i/web/status/1531943184317702146ArtyomSinitsyn
2022-06-01 10:10:21#Follina #CVE-2022-30190 Submitted from Viet Nam. Someone try to create a POC? #VinCSS #MalwareAnalysis https://t.co/pbL6q0MTdskienbigmummy
2022-06-01 10:10:17Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/MsZMuNyWpi https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/hmmzi
2022-06-01 10:10:12【Microsoft製品の #ゼロデイ 脆弱性 #Follina (CVE-2022-30190)」が発見される】 5月30日マイクロソフトが公表したMSDTに関する #脆弱性 について解説するブログを公開しました。すでに、本… https://t.co/juBj58Uld7 https://twitter.com/i/web/status/1531941014293753856trendmicro_jp
2022-06-01 10:00:33As the Follina (CVE-2022-30190) MSDT zero-day vulnerability is now being actively exploited, you should mitigate im… https://t.co/uh6PspHhaW https://twitter.com/i/web/status/1531936889850175496VeliUotila
2022-06-01 10:00:09Ya hay páginas que están explotando el fallo en el protocolo ms-msdt (Follina, CVE-2022-30190) que permite ejecutar… https://t.co/6J3eBFxQ1T https://twitter.com/i/web/status/1531937798227378178ssantosv
2022-06-01 09:50:52#software CVE-2022-30190: Zero Click Zero Day in Microsoft Support Diagnostic Tool Exploited in the Wild… https://t.co/Uz76ELn728 https://twitter.com/i/web/status/1531931943356579840softwaremars
2022-06-01 09:50:50Stamus users: please review the tech brief we released yesterday, "Detection of CVE-2022-30190 using Stamus Securit… https://t.co/44bsoL2YXl https://twitter.com/i/web/status/1531932080950677505StamusN
2022-06-01 09:50:49#Follina #CVE #Exploit #CVE-2022-30190 #threathunting #threatintelligence I have finished the draft, I hope it can… https://t.co/PkxYHXT0rA https://twitter.com/i/web/status/1531932399986409474BaoshengbinCumt
2022-06-01 09:50:47Stamus users: please review the tech brief we released yesterday, "Detection of CVE-2022-30190 using Stamus Securit… https://t.co/j2QpsgYLWw https://twitter.com/i/web/status/1531932575740137474StamusN
2022-06-01 09:50:14CVE-2022-30190 https://t.co/4QoZIe8axe https://github.com/dwisiswant0/gollinadwisiswant0
2022-06-01 09:50:11GitHub - onecloudemoji/CVE-2022-30190: CVE-2022-30190 Follina POC https://t.co/Prz0eTZxeJ https://github.com/onecloudemoji/CVE-2022-30190Securityblog
2022-06-01 09:50:06GitHub - PwnC00re/PoC-CVE-2022-30190 https://t.co/mqyq0I4B3x https://github.com/PwnC00re/PoC-CVE-2022-30190Securityblog
2022-06-01 09:16:06Microsoft Windows Support Diagnostic Tool (MSDT) code execution | CVE-2022-30190 - https://t.co/MkrDmD4rkV https://www.redpacketsecurity.com/microsoft-windows-support-diagnostic-tool-msdt-code-execution-cve-2022-30190/RedPacketSec
2022-06-01 09:04:14CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/GI3JSXExHu https://ift.tt/PyqzlbYmagiauk
2022-06-01 09:03:48Well, this sucks. Follina (CVE-2022-30190) is being used by a China-linked actor targeting Tibetan orgs https://t.co/vdmcSfH590 https://www.bleepingcomputer.com/news/security/windows-msdt-zero-day-now-exploited-by-chinese-apt-hackers/martijn_grooten
2022-06-01 08:51:06According to the latest analysis by knownsec 404 team CVE-2022-30190 bypass Defender is very easy, so we recommend… https://t.co/xFVxJF2vy1 https://twitter.com/i/web/status/153192069277345792080vul
2022-06-01 08:42:53マクロ無効でも悪用可能なMicrosoft Officeの新たなゼロデイ「Follina」(CVE-2022-30190)について、これまでの経緯や悪用例などをまとめました。 https://t.co/PJvcNGgfxm #Windows #脆弱性 #MSDT https://codebook.machinarecord.com/19734/MachinaRecord
2022-06-01 08:20:20Howto 'fix' CVE-2022-30190 (#0day #MSDT) GPO - HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnostics - Enab… https://t.co/ltzMSPol4m https://twitter.com/i/web/status/1531913358806597632xplynx
2022-06-01 08:15:30Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり | ニッチなPCゲーマーの環境構築Z https://t.co/ZK41UYLRmA https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.htmlohhara_shiojiri
2022-06-01 08:14:57CVE-2022-30190 - A vulnerability with chinese roots? 🧐https://t.co/P8JCdOb8NB https://blog.sekoia.io/msdt-abused-to-achieve-rce-on-microsoft-office/felixaime
2022-06-01 08:11:15Aktuelle Informationen zu CVE-2022-30190 #Follina und wie unsere Lösungen bei Schutz und Erkennung helfen finden Si… https://t.co/irsHZctWBt https://twitter.com/i/web/status/1531910590968496128TrendMicroALPS
2022-06-01 08:07:14CVE-2022-30190 | Microsoft Office Word Follina Remote Code Execution A vulnerability, which was classified as criti… https://t.co/xhDuIWfagf https://twitter.com/i/web/status/1531905951598534658threatmeter
2022-06-01 08:04:19Microsoft har udgivet information til Office (MSDT) 0-day sårbarheden CVE-2022-30190 #Follina Såbarheden ses aktiv… https://t.co/u3OvdySdr3 https://twitter.com/i/web/status/1531906384706654209CFCSsitcen
2022-06-01 08:01:01Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/a0ELapUnOg https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/nlawarp
2022-06-01 07:52:22🚨 Follina (CVE-2022-30190) 🚨 A critical Microsoft Word vulnerability and how it can affect the Web3 and NFT community0xFantasy
2022-06-01 07:51:41Aktuelle Informationen zu CVE-2022-30190 #Follina und wie unsere Lösungen bei Schutz und Erkennung helfen finden Si… https://t.co/KyWahlB75N https://twitter.com/i/web/status/1531904865689030656TrendMicroDE
2022-06-01 07:40:44I just pushed a quick update to NinjaC2 to integrate exploit for CVE-2022-30190 ms-msdt . You just need to run Ninj… https://t.co/6S61Ww4WK5 https://twitter.com/i/web/status/1531901761304289280ahmed_khlief
2022-06-01 07:33:13Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり | ニッチなPCゲーマーの環境構築Z https://t.co/pytzAH8HMS https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.htmlRB7010
2022-06-01 07:21:26PoC-CVE-2022-30190 CVE 0-day MS Offic RCE aka msdt follina https://t.co/2JZTQRo27P #cve #poc GitHub GitHub - Pw… https://t.co/Jx1t9UFsGJ https://github.com/PwnC00re/PoC-CVE-2022-30190 https://twitter.com/i/web/status/1531895959394861057hack_git
2022-06-01 07:20:16Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり https://t.co/9Yg3vLT2Fk ”この脆弱性は、Windows7、Window… https://t.co/BPZOZXLvTZ https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.html https://twitter.com/i/web/status/1531898160783577089catnap707
2022-06-01 07:00:13.@FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The… https://t.co/Qlk94i2gEg https://twitter.com/i/web/status/1531892581839392768Scheehan
2022-06-01 06:40:20We have updated analysis of CVE-2022-30190 within @AttackerKb - note also includes a link to @metasploit module:… https://t.co/V4hF0icnQm https://twitter.com/i/web/status/1531887668145147905Raj_Samani
2022-06-01 06:30:28سر صبحی همینو کم داشتیم CVE-2022-30190 https://t.co/hYNoF14lZliranzaad
2022-06-01 06:30:241/ The exploitation of CVE-2022-30190 #Follina isn’t hard to detect In fact, proc creation logs with parent info a… https://t.co/M0tLC7scnR https://twitter.com/i/web/status/1531884486341840897cyb3rops
2022-06-01 06:30:18Du bör se över säkerheten i Office. Nu. Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability… https://t.co/iTZUXC9PKj https://twitter.com/i/web/status/1531884755968475136JonasJaani
2022-06-01 06:20:55Scary "wget" demo of CVE-2022-30190 MSDT RCE (wget in PS is just an alias Invoke-WebRequest). https://t.co/7fD66JXcDF https://twitter.com/0xBacco/status/1531599168363548672faultycloud
2022-06-01 06:20:43#Exploiting MSDT 0-Day #CVE-2022-30190 https://t.co/6vFj3b9Gd7 https://www.youtube.com/watch?v=dGCOhORNKRkWilfridBlanc
2022-06-01 06:20:35New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190). https://t.co/HIdikZTFXJ CVE-20… https://t.co/QAHuinOTCE https://isc.sans.edu/forums/diary/New+Microsoft+Office+Attack+Vector+via+msmsdt+Protocol+Scheme+CVE202230190/28694 https://twitter.com/i/web/status/1531879512132263936seguridadyredes
2022-06-01 06:20:23Démonstration vidéo de l'exploitation de la vulnérabilité Microsoft Office : MSDT 0-Day CVE-2022-30190 https://t.co/7WdladUKEJ https://m.youtube.com/watch?v=dGCOhORNKRk&feature=youtu.bearcsi_fr
2022-06-01 06:20:20CVE-2022-30190 https://t.co/WR7u4rNUXE https://twitter.com/chowtv1/status/1531203166406066176cHowTv1
2022-06-01 06:20:18So I wrote a quick #SCCM #MECM CI/CB script pair to detect/remediate the regkey detailed in CVE-2022-30190 "Follina… https://t.co/uEC51RYN3R https://twitter.com/i/web/status/1531881599096299521julian_west
2022-06-01 06:20:16https://t.co/h7vI5bB7B8 Microsoft RCE “Follina” Zero-Day (CVE-2022-30190) Found In MSDT, Office #cybersecurity https://www.blumira.com/cve-2022-30190-follina/netsecu
2022-06-01 05:55:33Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability https://t.co/4GnFffFfz1 https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/Secnewsbytes
2022-06-01 05:32:37Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190 ... https://t.co/MYNtRngiMo https://t.co/w135ewAWBO http://izumino.jp/Security/sec_trend.cgi?ref=tw&ref_date=2022-06-01%2014%3A20 https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.htmlsec_trend
2022-06-01 05:24:30💻 @SentinelOne vs CVE-2022-30190 (#Follina) https://t.co/DDOzPImBqe #EDR #XDR #cybersecurity https://t.co/uWmbLhfJHJ https://www.youtube.com/watch?v=aubqNyF2C_s https://twitter.com/USCERT_gov/status/1531713602050486272jc_vazquez
2022-06-01 05:02:33@4lteredBeast CVE-2022-30190 if anyone wants a bit more info ✌️paulpickupstixx
2022-06-01 05:00:38Mentioned #Follina #CVE-2022-30190 +extra 👇👇👇 https://t.co/1LXnqsXhe8 https://t.co/VLoXghI6cH https://t.co/xG110FDlnn https://bazaar.abuse.ch/browse/tag/follina/ https://twitter.com/Unit42_Intel/status/1531767484050817025JAMESWT_MHT
2022-06-01 04:42:39Threat hunting for #follina (CVE-2022-30190) activity: https://t.co/HI9yfxXe1k https://www.reddit.com/r/crowdstrike/comments/v1qrnz/hunting_follina_microsoft_code_execution/robertmichalski
2022-06-01 04:32:30・Microsoft Officeからリモートコード実行の危険性。MSDTにゼロデイ脆弱性(CVE-2022-30190)。回避策あり https://t.co/ZTL4elL0T1 https://www.nichepcgamer.com/archives/microsoft-office-remote-code-execution-vulnerability-cve-2022-30190.htmlbunbun3131
2022-06-01 04:30:22Officeに未修正のゼロデイ脆弱性 Microsoftは回避策を公開 https://t.co/ETClFZvkUe Windowsのゼロデイ・ゼロクリック脆弱性に関する共通脆弱性識別子「CVE-2022-30190」の記事… https://t.co/NLJw5zhghU https://www.sankei.com/article/20220601-OJE7FPTCYFKEVFVOAOJMIEDRCE/ https://twitter.com/i/web/status/1531855012447432705VELO_ch
2022-06-01 04:20:54Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability CVE-2022-30190 https://t.co/MzkXlkYkg9 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190rniedhorn
2022-06-01 04:11:40#Zero-day bug exploited by attackers via macro-less #Office documents (CVE-2022-30190) https://t.co/5EBt9Jgksf #HelpNetSecurity https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/SecurityNewsbot
2022-06-01 04:11:26Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability https://t.co/y4ex754xnW https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/PVynckier
2022-06-01 03:40:50On the topic of the ms-msdt 0-day out there (CVE-2022-30190/Follina), here's an external protocol origin spoofing i… https://t.co/cSQ8qf5ttN https://twitter.com/i/web/status/1531841329667399682AlesandroOrtizR
2022-06-01 03:20:26The latest update for #ArcticWolf includes "CVE-2022-30190 - Microsoft Windows Support Diagnostic Tool (MSDT) Remot… https://t.co/LLw9T9b7Ke https://twitter.com/i/web/status/1531837224790130688opsmatters_uk
2022-06-01 03:11:33https://t.co/erT9fWu6nt Staying Ahead of CVE-2022-30190 (Follina) #cybersecurity https://www.sentinelone.com/blog/staying-ahead-of-cve-2022-30190-follina/netsecu
2022-06-01 03:10:38@im_geeg Our threat intelligence team is closely monitoring #Follina (CVE-2022-30190) and urge network defenders to… https://t.co/jBcEvfhrgf https://twitter.com/i/web/status/1531835258508804096KrollWire
2022-06-01 03:10:30Microsoft issues workaround for Windows Support Diagnostic Tool "Follina" Vulnerability CVE-2022-30190… https://t.co/vcqsdY7WGO https://twitter.com/i/web/status/1531835275319693312securezoo
2022-06-01 03:10:21Literally my new nickname after CVE-2022-30190 https://t.co/CNcfjQwsqW https://twitter.com/HackingLZ/status/1497986513459576837Laughing_Mantis
2022-06-01 02:40:20SplunkでのFollinaの検知について諸々Blog RCE à La Follina (CVE-2022-30190) https://t.co/cUo7iC4jCc #splunkBlogs https://www.splunk.com/en_us/blog/security/rce-la-follina-cve-2022-30190.htmlpapa_anniekey
2022-06-01 02:40:10Microsoft MSDTにコード実行脆弱性 CVE-2022-30190 が確認されました。この脆弱性が悪用されるとローカルのWordマクロポリシーがバイパスされ、プレビューのみで文書をクリックしなくても攻撃が成功する可能性が… https://t.co/gXHMHIVSl1 https://twitter.com/i/web/status/1531827601098084353unit42_jp
2022-06-01 02:24:19#Follina #CVE #Exploit #CVE-2022-30190 #threathunting #threatintelligence Follina's Timeline… https://t.co/wOc6OKXDyw https://twitter.com/i/web/status/1531821860744478720BaoshengbinCumt
2022-06-01 02:14:01Word文書を開いたり、プレビューするだけで任意のコードが実行される脆弱性(CVE-2022-30190)にMicrosoftが回避策を公開中 https://t.co/VhTdVN0rvD https://www.itmedia.co.jp/news/articles/2206/01/news067.htmlA_zs_Blog
2022-06-01 02:13:18So for CVE-2022-30190, I did some PoC testing without payloads and had successful exploitation with starting progra… https://t.co/PVZ971t5IB https://twitter.com/i/web/status/1531819966927884289djloxso
2022-06-01 02:12:45Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability https://t.co/5rMj8XnRp2 #Infosec https://ift.tt/7RpENFzSecUnicorn
2022-06-01 02:01:03#Follina CVE-2022-30190 Submitted: 2022-05-30 Filename: 123.docx https://t.co/9XBHw4apYk 🤔Domain is down or has nev… https://t.co/TmFvOiKDy7 https://www.virustotal.com/gui/file/3db60df73a92b8b15d7885bdcc1cbcf9c740ce29c654375a5c1ce8c2b31488a1/relations https://twitter.com/i/web/status/1531817747243761664StopMalvertisin
2022-06-01 02:00:25"Follina MSDT Zero-Day Targets MS Word In Only One Click - CVE-2022-30190" explained by @sec_studio… https://t.co/ryu9EYMkkH https://twitter.com/i/web/status/1531817814146818052Nouureldin_Ehab
2022-06-01 01:54:32« This Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution flaw (tracked as CVE-2022-30190) impa… https://t.co/OcVkhcbVQd https://twitter.com/i/web/status/1531812982673485824CorbeauAttentif
2022-06-01 01:52:39« This Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution flaw (tracked as CVE-2022-30190) impa… https://t.co/F4PvnLv7Aa https://twitter.com/i/web/status/1531813724842971136CorbeauAttentif
2022-06-01 01:51:47#Follina CVE-2022-30190 Submitted: 2022-05-31 Corresponding .DOCX file: fc6a9b001b8b07437b221d70343259d51a6ec580c62… https://t.co/W6LrU1Z52z https://twitter.com/i/web/status/1531813921103171584StopMalvertisin
2022-06-01 01:47:24Follina-Schwachstelle (CVE-2022-30190), Warnungen & erste Angriffe, der Status https://t.co/UaSWiIVRPd #Office… https://t.co/JvTiyFUnfg https://www.borncity.com/blog/2022/06/01/follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status/ https://twitter.com/i/web/status/1531810692713664512etguenni
2022-06-01 01:42:56@TalosSecurity @CiscoSecure @Cisco What's your response to Follina (CVE-2022-30190)? I haven't heard a peep...CleaverFd
2022-06-01 01:42:23Note that this is not CVE-2022-30190 but uses the same OLEObject vector as CVE-2021-40444 and CVE-2022-30190, howev… https://t.co/WhrscOFOYI https://twitter.com/i/web/status/1531811993988091904hackerfantastic
2022-06-01 01:41:28という以上をひっくるめて、ESを使ている場合はこちらを今後使えるようになるようです。 Microsoft Support Diagnostic Tool Vulnerability CVE-2022-30190… https://t.co/G35Euoxolf https://twitter.com/i/web/status/1531812261358030849papa_anniekey
2022-06-01 01:13:26「米Microsoftは5月30日(現地時間)、Windowsのゼロデイ・ゼロクリック脆弱性に関する共通脆弱性識別子「CVE-2022-30190」を発行した。本稿執筆現在まだ修正は公開されておらず、Microsoftは回避策を説… https://t.co/5BLZ7Y0xND https://twitter.com/i/web/status/1531803041070030851sakak
2022-06-01 01:12:09📺SentinelOne VS CVE-2022-30190 (#Follina) https://t.co/i10jtMpoGP https://www.youtube.com/watch?v=aubqNyF2C_sSentinelOne
2022-06-01 01:10:25See Microsoft Security Response Center's Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/ecfKIxHSIP https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ttcs
2022-06-01 00:54:03SentinelOne vs CVE-2022-30190 https://t.co/jS0tqX6rVD https://www.sentinelone.com/blog/staying-ahead-of-cve-2022-30190-follina/Jeffrey_R_White
2022-06-01 00:51:46New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)Microsoft Office documents (malloc… https://t.co/iCkMlgC5aZ https://twitter.com/i/web/status/1531799564063326209weam1414
2022-06-01 00:43:43Thanks, @_JohnHammond for the great POC on ms-msdt RCE (CVE-2022-30190). @securityonion seems to be catching the go… https://t.co/ANVbzElYK9 https://twitter.com/i/web/status/1531796111308070912ColeVanlanding1
2022-06-01 00:42:34Follina: Attack via Word documents and ms-msdt protocol (CVE-2022-30190) https://t.co/Je4uiQyY3K #Office #Security… https://t.co/tIk0tsw5eu https://borncity.com/win/?p=24692 https://twitter.com/i/web/status/1531796730123112448etguenni
2022-06-01 00:42:18“Folina” (CVE-2022-30190): Microsoft Support Diagnostic Tool 0-Day Vulnerability Being Actively Exploited – Kudelsk… https://t.co/0BV4N26Tdp https://twitter.com/i/web/status/1531796885987549185Secnewsbytes
2022-06-01 00:42:05“Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability” https://t.co/oWfLeLcCnC https://htn.to/hxp1iTX6Uowaiha8
2022-06-01 00:41:49Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/7CmlweqzZk https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/InfoSecPhils
2022-06-01 00:23:53CVE-2022-30190 – Leitfaden für Sicherheitsupdates – Microsoft Windows Support Diagnostic Tool Remote Code Execution… https://t.co/3AOt4pVpEY https://twitter.com/i/web/status/1531790282643185664valdet_b
2022-06-01 00:23:27CVE-2022-30190、よくわからんなぁ。仮想マシンでPoC試してるけど、動く環境と動かない環境がある。_ktwr
2022-06-01 00:22:48How to detect CVE-2022-30190, the "Follina" remote code execution vulnerability that is exploitable on all current… https://t.co/rzfljnYauE https://twitter.com/i/web/status/1531790951550689281uberAgentApp
2022-06-01 00:13:31Security Advisory Regarding Follina: CVE-2022-30190 (Follina) Details Hurricane Labs is aware of the recent CVE-202… https://t.co/pZphgZZY6f https://twitter.com/i/web/status/1531787888676900865cipherstorm
2022-06-01 00:11:33#uberAgent #Detection #Office Detecting CVE-2022-30190 (Office RCE) With uberAgent ESA & Splunk https://t.co/mKzqNZmA68 https://uberagent.com/blog/detecting-cve-2022-30190-office-rce-with-uberagent-esa-splunk/?utm_source=dlvr.it&utm_medium=twitteredwingeboers
2022-06-01 00:04:18Sharing our #MicrosoftSentinel detections and alerts for CVE-2022-30190 #follina - In this repo, you'll find alerts… https://t.co/eXDRcyorq8 https://twitter.com/i/web/status/1531728261541158913sentinel_blue
2022-06-01 00:03:33🚨 [CVE-2022-30190] [CVSS 7.8] #Follina Zero-day permettant l'exécution de code dans les produits #Office. Aucune… https://t.co/lMBOaE5HZJ https://twitter.com/i/web/status/1531785498271924224Z3roS0c
2022-06-01 00:03:23Staying Ahead of CVE-2022-30190 (Follina)  #infosec #infosecurity #cybersecurity #threatintel #threatintelligence… https://t.co/TEecjgOheq https://twitter.com/i/web/status/1531785509722284035CyberIQs_
2022-05-31 23:46:36Sharing our #MicrosoftSentinel detections and alerts for CVE-2022-30190 #follina - In this repo, you'll find alerts… https://t.co/eXDRcyorq8 https://twitter.com/i/web/status/1531728261541158913sentinel_blue
2022-05-31 23:41:49Technical Advisory: CVE-2022-30190 Zero-day Vulnerability “Follina” i #infosec #infosecurity #cybersecurity… https://t.co/iektWdSvIJ https://twitter.com/i/web/status/1531781030474047489CyberIQs_
2022-05-31 23:40:32Staying Ahead of CVE-2022-30190 (Follina) https://t.co/KDXuL8T0yS https://t.co/stdtag31Yg https://ift.tt/vAN6bVR https://ift.tt/Ot7a4Aibuaqbot
2022-05-31 23:33:48「CVE-2022-30190 Microsoft Support診断Toolの脆弱性に関するGuidance」 Guidance for CVE-2022-30190 Microsoft Support Diagnostic T… https://t.co/Nb0mIZybFO https://twitter.com/i/web/status/1531778753021747205kabukawa
2022-05-31 23:33:35"2022年5月30日(月)、MicrosoftはWindowsのMicrosoft Support Diagnostic Tool(MSDT)の脆弱性に関してCVE-2022-30190を発表しました。 Word等の呼び出し側… https://t.co/JEqFUty1Ak https://twitter.com/i/web/status/1531778754615607297kabukawa
2022-05-31 23:33:20「CVE-2022-30190 」 https://t.co/JAvaikzr5Q https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30190kabukawa
2022-05-31 23:30:32Sharing our #MicrosoftSentinel detections and alerts for CVE-2022-30190 #follina - In this repo, you'll find alerts… https://t.co/eXDRcyorq8 https://twitter.com/i/web/status/1531728261541158913sentinel_blue
2022-05-31 23:30:24New Microsoft Vulnerability CVE-2022-30190 Remote Code Vulnerability I wonder if Russia has any of these?🤔😅 https://t.co/7YuioQ2MtP https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/three_cube
2022-05-31 23:20:29Fixing CVE-2022-30190 (urgent security vulnerability in Windows/Office with active exploitation): reg export HKEY_… https://t.co/qmcoeVGViq https://twitter.com/i/web/status/1531777052659048448drrgr_official
2022-05-31 23:13:44Sharing our #MicrosoftSentinel detections and alerts for CVE-2022-30190 #follina - In this repo, you'll find alerts… https://t.co/eXDRcyorq8 https://twitter.com/i/web/status/1531728261541158913sentinel_blue
2022-05-31 23:10:55Similarity between CVE-2022-30190 aka Follina and CVE-2010-1885 should tell you there are more bugs to be found here abusing inherent trust.n00bznet
2022-05-31 22:53:24Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190)... Be careful out there!… https://t.co/y73bUPmyWo https://twitter.com/i/web/status/1531768637496991746CyberSparta
2022-05-31 22:41:19Staying Ahead of CVE-2022-30190 (Follina)  #sentinelone #infosec https://t.co/8QPMZTIL8I https://www.sentinelone.com/blog/staying-ahead-of-cve-2022-30190-follina/Romain_Lauret
2022-05-31 22:41:13Staying Ahead of CVE-2022-30190 (Follina)  https://t.co/OUBV3v0I99 https://bit.ly/3m4Dw1npigram86
2022-05-31 22:40:10CVE-2022-30190 aka #Follina has potential to be of high impact given the amount of publicly available information,… https://t.co/ItQbljG3lI https://twitter.com/i/web/status/1531767484050817025Unit42_Intel
2022-05-31 22:31:16Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/47hybqoxTc via… https://t.co/xzPDv4O33L https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/ https://twitter.com/i/web/status/1531762840780124160ChiNetworks
2022-05-31 22:22:14Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability https://t.co/KPRtZo5d4J https://ift.tt/7RpENFzAHEADBenM
2022-05-31 22:21:14Hey folks 👋, STRT just put out a release with 3 🛡️ new detections for CVE-2022-30190 #Follina .. check the splunk… https://t.co/B7RAV4hLuN https://twitter.com/i/web/status/1531761058335055874d1vious
2022-05-31 22:21:04CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/h79ogrgaOl https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/Tamadusan
2022-05-31 22:20:59Follina (CVE-2022-30190): a vulnerability in MSDT | Kaspersky official blog https://t.co/HFD1wwIuDk https://www.kaspersky.co.uk/blog/follina-cve-2022-30190-msdt/24512/Secnewsbytes
2022-05-31 22:20:45KQL for hunting msdt.exe spawned by Microsoft office products. CVE-2022-30190 #follina https://t.co/FTyQfKx3Kp0xgnnr
2022-05-31 22:20:17Diving into #Follina (CVE-2022-30190) RTF 0Click - with winword.exe being the preview functionality it still spawns… https://t.co/ciJOj85k9j https://twitter.com/i/web/status/1531761808024948738im_geeg
2022-05-31 22:10:54"Exploiting MSDT 0-Day CVE-2022-30190" Explained by @_JohnHammond https://t.co/ntzJIKOrt3 #CyberSecurity… https://t.co/rii4KH8nQJ https://www.youtube.com/watch?v=dGCOhORNKRk https://twitter.com/i/web/status/1531757419415609345Nouureldin_Ehab
2022-05-31 22:10:51"Unit42 Blog": Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability ... mas info aqui https://t.co/amuoZHUbME by @Unit42_Intel https://unit42.paloaltonetworks.com/cve-2022-30190-msdt-code-execution-vulnerability/FINSIN_CL
2022-05-31 22:10:36Microsoft RCE “Follina” Zero-Day (CVE-2022-30190) Found In MSDT, Off #infosec #infosecurity #cybersecurity… https://t.co/VJ99AkEbX2 https://twitter.com/i/web/status/1531757833192148993CyberIQs_
2022-05-31 22:00:43Microsoft issued CVE-2022-30190 for Microsoft Support Diagnostic Tool Zero Day Vulnerability. Work around is to dis… https://t.co/zZMaaBzpIP https://twitter.com/i/web/status/1531755513100259328JoeLouisDetroit
2022-05-31 22:00:35Threat Brief: CVE-2022-30190 – MSDT Code Execution Vulnerability #infosec #infosecurity #cybersecurity #threatintel… https://t.co/PHUCbP3yvt https://twitter.com/i/web/status/1531755807796248576CyberIQs_
2022-05-31 22:00:12Microsoft Office RCE "Follina" (CVE-2022-30190) . #cybersecurity #RCE #Follina #infosec https://t.co/1ClpFfqzoxHac10101
2022-05-31 21:51:05Microsoft "Microsoft Support Diagnostic Tool" (MSDT) aracında tespit edilen Zeroday zafiyet (CVE-2022-30190) için w… https://t.co/9ATcEAR18Q https://twitter.com/i/web/status/1531752900149624832RSUconsultancy
2022-05-31 21:40:28CVE-2022-30190 / Follina makes it very obvious (once again) that barely anyone runs application control or knows ho… https://t.co/LwiwHHLSkY https://twitter.com/i/web/status/1531751061458980869N805DN
2022-05-31 21:40:24Mitigation steps for CVE-2022-30190. No patch yet. https://t.co/B4NksHUcUy https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-mitigation-for-office-zero-day-exploited-in-attacks/_sc0rn
2022-05-31 21:20:55⚠️Alerte CERT-FR⚠️ via @CERT_FR La vulnérabilité CVE-2022-30190, affectant Microsoft Windows, permet à un attaqua… https://t.co/TdXqTZP9R6 https://twitter.com/i/web/status/1531745648999112704argevise
2022-05-31 21:20:18Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/njjqr3Ws6C https://youtu.be/dGCOhORNKRkDkavalanche
2022-05-31 21:00:53Tips on how you can protect your home systems from the new CVE-2022-30190: Microsoft Support Diagnostic Tool Vulner… https://t.co/g1g2Mbajya https://twitter.com/i/web/status/1531739619733168128Breaking_Cyber
2022-05-31 21:00:50Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center… https://t.co/RmSWAY9gIR https://twitter.com/i/web/status/1531739952710569984JeffEnglander
2022-05-31 21:00:47Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/IyoTslv6jJ Workaround: Run… https://t.co/KWcKNnCrkE https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ https://twitter.com/i/web/status/1531740073015881728spyblog
2022-05-31 20:50:07CVE-2022-30190 aka #Follina. - uses Microsoft Diagnostic Tool (MSDT) to remotely access the payload - does not req… https://t.co/cQUUXGojW6 https://twitter.com/i/web/status/1531739078743449605InfinityEx1sts
2022-05-31 20:30:30「レドモンドによると、管理者とユーザーは、悪意のある攻撃者がトラブルシューティングを開始し、脆弱なシステムでコードを実行するために使用するMSDT URLプロトコルを無効にすることで、CVE-2022-30190を悪用する攻撃をブ… https://t.co/bvrHzh5b6D https://twitter.com/i/web/status/1531732798209400832foxbook
2022-05-31 20:21:19Hunt and detect #follina CVE-2022-30190 with #MicrosoftSentinel - this is a functional #rce remote code execution… https://t.co/mRO9tJfURo https://twitter.com/i/web/status/1531728375156457474andy_sblu
2022-05-31 20:21:08ICYMI there's a bug in Office that Microsoft said wasn't a security flaw and now says it is: CVE-2022-30190 A Word… https://t.co/hQwJvkuZag https://twitter.com/i/web/status/1531729897554644992TheRegister
2022-05-31 20:20:05I have successfully integrated CVE-2022-30190 ms-msdt vulnerability to MacroPack Pro. Docx format done, including t… https://t.co/lr90lScG7F https://twitter.com/i/web/status/1531732180736610304EmericNasi
2022-05-31 20:10:10Follina MSDT Zero-Day Targets MS Word In Only One Click - CVE-2022-30190 https://t.co/c68v6BOBgF via @YouTube https://youtu.be/FeBkxjtAOpoITPR_Guy
2022-05-31 20:10:05The interesting domain used in these #Follina #CVE-2022-30190 samples is very similar to the sample found by… https://t.co/TGkI3Zo9DS https://twitter.com/i/web/status/1531729671901134849fr0s7_
2022-05-31 20:00:53Microsoft releases workaround addressing RCE vuln. CVE-2022-30190, "Follina" in Microsoft Support Diagnostic Tool (… https://t.co/p25s8XUaKv https://twitter.com/i/web/status/1531725312157007874ADOatFerrilli
2022-05-31 20:00:08https://t.co/RmQfXFk1WB CVE-2022-30190 Detection: Updates on Microsoft Windows RCE Vulnerability #cybersecurity https://socprime.com/blog/cve-2022-30190-detection-updates-on-microsoft-windows-rce-vulnerability/netsecu
2022-05-31 19:52:24Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/O7ROWgBdD8 via @YouTube https://youtu.be/dGCOhORNKRkSwanZeroSkydas
2022-05-31 19:51:54See Microsoft's guidance for CVE-2022-30190 on workarounds, detections, and protections https://t.co/CaQ2UyTPFR #follina https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/D3Security
2022-05-31 19:40:36Microsoft has released workaround guidance to address a remote code execution (RCE) vulnerability—CVE-2022-30190, k… https://t.co/P82l3vEsr5 https://twitter.com/i/web/status/1531721000282378241RRalstonAgile
2022-05-31 19:40:28Follina (CVE-2022-30190): a vulnerability in MSDT | Kaspersky official blog https://t.co/dT3NivpkJI https://t.co/w793E2QErK https://www.kaspersky.com/blog/follina-cve-2022-30190-msdt/44461/?utm_source=dlvr.it&utm_medium=twitterCyberSecurityPr
2022-05-31 19:40:17CVE-2022-30190 | AttackerKB https://t.co/ImetCkD6Mo https://attackerkb.com/topics/Z0pUwH0BFV/cve-2022-30190Securityblog
2022-05-31 19:31:06Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/gb83NW6rrv https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/KajaCiglic
2022-05-31 19:30:52This thesis paper on Electron security vulnerabilities which included CVE-2022-30190 will never stop being funny, a… https://t.co/TJeOZswENk https://twitter.com/i/web/status/1531718297724526592hackerfantastic
2022-05-31 19:30:22Playing around with a PoC of #CVE-2022-30190 and Kaspersky i found out that the EDR mecanism can stop the exploit ,… https://t.co/q1JaHEDa17 https://twitter.com/i/web/status/1531719296736546817Dav_alo1
2022-05-31 19:30:12#Microsoft publicó Guía de herramientas de diagnóstico de #vulnerabilidades: ( CVE-2022-30190) Vía Microsoft… https://t.co/bEFeRizSr5 https://twitter.com/i/web/status/1531719587665850368AMCID_Mx
2022-05-31 19:21:23Microsoft Security Response Center: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/3VyOz00P54 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/HanSoloMio
2022-05-31 19:20:26Microsoft Releases Workaround Guidance for MSDT Follina Vulnerability Guidance for CVE-2022-30190 Microsoft Suppor… https://t.co/JK2VaBTMbn https://twitter.com/i/web/status/1531716298786295808z3r0trust
2022-05-31 19:20:23Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/73EJ9R7iFz https://lnkd.in/e-swgpdNErcumentSumnulu
2022-05-31 19:11:13I'm really struggling to understand the hype on CVE-2022-30190; are you folks just bored?? https://t.co/GX0QvP2jjw https://twitter.com/Junior_Baines/status/1531698736887382018NTKramer
2022-05-31 19:11:09🔥 So... we have another exploit... Let's talk about CVE-2022-30190 AKA "#Follina", which is a newly-discovered zer… https://t.co/8dfa1rKc2I https://twitter.com/i/web/status/1531712364789125120sec_studio
2022-05-31 19:10:50Microsoft has released workaround guidance for the "Follina" RCE vulnerability (CVE-2022-30190) affecting the MSDT.… https://t.co/Kw947zjZDD https://twitter.com/i/web/status/1531713602050486272USCERT_gov
2022-05-31 19:10:12CVE-2022-30190 Way to go crazymanwontstaystill
2022-05-31 19:10:09Microsoft has released workaround guidance for the "Follina" RCE vulnerability (CVE-2022-30190) affecting the MSDT.… https://t.co/BLvvDH2LoF https://twitter.com/i/web/status/1531714527074689024sabreonpoint
2022-05-31 19:00:57CVE-2022-30190の回避策。 ms-msdtで始まるURLアクセスを脆弱性悪用のトリガにするので、レジストリ編集してms-msdtで始まるURLを使えなくする。/Microsoftの診断ツールにゼロデイ脆弱性、「Word… https://t.co/roN55O5Rql https://twitter.com/i/web/status/1531710187299405824wakatono
2022-05-31 19:00:50How to act on Microsoft Support Diagnostic Tool Vulnerability (CVE-2022-30190)? Disable MSDT URL protocol. reg del… https://t.co/gHBvcDZy93 https://twitter.com/i/web/status/1531710609728888839DigitalAmli
2022-05-31 19:00:47How to act on Microsoft Support Diagnostic Tool Vulnerability (CVE-2022-30190)? Disable MSDT URL protocol. reg del… https://t.co/d8lp4n9V0w https://twitter.com/i/web/status/1531710937266364416CSA_DVillamizar
2022-05-31 19:00:14@TrendMicro @TrendMicroRSRCH any info on CVE-2022-30190 / Microsoft Windows Support Diagnostic Tool (MSDT) Remote C… https://t.co/RaONRX7d77 https://twitter.com/i/web/status/1531711476725063680SCCM_Ryan
2022-05-31 18:40:35Microsoft Office Zero-day #Exploit “#Follina” (CVE-2022-30190) Allows Attackers to Execute PowerShell with a… https://t.co/gkZuLxzZW0 https://twitter.com/i/web/status/1531705896593678336Zer0Security
2022-05-31 18:40:11The fact that CVE-2021-40444 and now CVE-2022-30190 can take advantage of the preview pane to bypass all current mi… https://t.co/e1Eial6Qmd https://twitter.com/i/web/status/1531706587156361216jdgregson
2022-05-31 18:30:39@serghei CISA urges admins and users to apply workarounds for this actively exploited zero-day (CVE-2022-30190 aka… https://t.co/oBLSms9QXE https://twitter.com/i/web/status/1531702106658332673BleepinComputer
2022-05-31 18:30:16Attack surface reduction rule, GUID "d4f940ab-401b-4efc-aadc-ad5f3c50688a" will block CVE-2022-30190 MSDT shenaniga… https://t.co/XJFvdZCCEr https://twitter.com/i/web/status/1531703875920699394_JohnHammond
2022-05-31 18:30:10The exploit has been assigned the identifier CVE-2022-30190. You can find Microsoft's official advisory here:… https://t.co/aLk7ksugaW https://twitter.com/i/web/status/1531704347242942469Torettox84
2022-05-31 18:20:10Learn more about the biggest Zero-Day of the moment, the Microsoft MSDT Zero-Day (Follina/CVE-2022-30190). Noureldi… https://t.co/l0L7RE1sRw https://twitter.com/i/web/status/1531700621572722688hacktoria
2022-05-31 18:10:47The flaw (CVE-2022-30190) resides in the Office suite of products and can be exploited to achieve code execution on… https://t.co/LgGc0ZR9lJ https://twitter.com/i/web/status/1531697234793926662SymproBilisim
2022-05-31 18:10:30Microsoft la está manejando como CVE-2022-30190, afecta a todas las versiones de Windows que aún reciben actualizac… https://t.co/kNKCPuT1t8 https://twitter.com/i/web/status/1531698316681129986ciberseguridadx
2022-05-31 18:10:11CVE-2022-30190 - Microsoft Windows Support Diagnostic Tool RCE https://t.co/rDOmmZY0sN #PoC #Exploit #follina https://t.co/F1DINMcrnm https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190ov3rflow1
2022-05-31 18:01:13#FortiGuardLabs Threat Signal Report: Follina: 0-day Windows MSDT Vulnerability (CVE-2022-30190) Exploited In The W… https://t.co/vsi9HkvTIC https://twitter.com/i/web/status/1531694513022029824FortiGuardLabs
2022-05-31 18:01:09CVE-2022-30190 is a flaw in the Microsoft Support Diagnostic Tool (MSDT) that allows for remote code execution when… https://t.co/gfEQHNXamL https://twitter.com/i/web/status/1531694513546207240Automox
2022-05-31 18:01:00Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability CVE-2022-30190 is being detected using phish.ndb 👍sanesecurity
2022-05-31 17:50:08Check out Hurricane Labs' Security Advisory Regarding #Follina (CVE-2022-30190) – https://t.co/ShRwWDHkRa This adv… https://t.co/ddhDCnlCbK https://bit.ly/3lZGSCJ https://twitter.com/i/web/status/1531693540048261127hurricanelabs
2022-05-31 17:40:23@RealSharpNinja This won't do a thing to prevent exploitation of CVE-2022-30190 though. The package being abused he… https://t.co/bEkZIFWi1E https://twitter.com/i/web/status/1531689668126904324wdormann
2022-05-31 17:30:31Ouch! Possible MSDT RCE in Microsoft Windows. CVE-2022-30190 I am behind on this so I still am not aware of the det… https://t.co/xUq8O2RIXi https://twitter.com/i/web/status/1531686960338812930iam_py_test
2022-05-31 17:30:22Zero-day #bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/5vFOlsXOvk https://lnkd.in/eMxcANK4jandres_casado
2022-05-31 17:20:12It's not highlighted (from what I can see) but this is using CVE-2022-30190 https://t.co/9PBsaS5BFh https://twitter.com/SBousseaden/status/1531614356340936705sudosev
2022-05-31 17:00:44Upozorňujeme na závažnou zranitelnost CVE-2022-30190 (tzv. "Follina") týkající se kancelářského balíku Microsoft Of… https://t.co/6rfGqpluJ6 https://twitter.com/i/web/status/1531680190035795977GOVCERT_CZ
2022-05-31 17:00:32Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) – Help Net Security https://t.co/3Mk80V8xHb https://newsaxes.com/zero-day-bug-exploited-by-attackers-by-way-of-macro-less-workplace-paperwork-cve-2022-30190-assist-web-safety/newsaxes
2022-05-31 16:50:39CVE-2022-30190 has the potential to be a headache for a lot of our #MSP partners. Check our reddit post explaining… https://t.co/Vs8xWaM0rM https://twitter.com/i/web/status/1531677025261461504cybersec_nerd
2022-05-31 16:40:04CVE-2022-30190, aka 'Follina', a new Microsoft 0-day RCE https://t.co/9Gzlye5zBC #cybersecurity https://www.connectwise.com/resources/follina-new-office-0dayConnectWiseCRU
2022-05-31 16:20:04#DailyHackManac Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft… https://t.co/TPLC7GqduQ https://twitter.com/i/web/status/1531671731240329216H4ckManac
2022-05-31 16:10:32#CVE-2022-30190 aka #Follina – an #RCE vulnerability in Microsoft Support Diagnostic Tool (MSDT) is gaining tractio… https://t.co/9YMHiygIl8 https://twitter.com/i/web/status/1531666868444049410SOC_Prime
2022-05-31 16:10:12I decided to add CVE-2022-30190 msdt Office vulnerability to MacroPack Pro. A beta version should be be available tomorrow! #redteamEmericNasi
2022-05-31 16:10:08New emergent threat response, "CVE-2022-30190: '#Follina' Microsoft Support Diagnostic Tool Vulnerability." Our res… https://t.co/ojoVpviHHA https://twitter.com/i/web/status/1531668124738760704rapid7
2022-05-31 16:10:03Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/Tm0HzOSfzD https://twitter.com/i/web/status/1531668890647990272r45c4l
2022-05-31 16:00:23Microsoft has put a notice out which is numbered CVE-2022-30190 nicknamed "Follina". This attack leverages malicio… https://t.co/vDzcuiLe2c https://twitter.com/i/web/status/1531664717479034880CyberShiftTech
2022-05-31 15:50:37Microsoft released guidance on CVE-2022-30190, 'Follina', new Office 0-day https://t.co/1NIzUchleO https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ConnectWiseCRU
2022-05-31 15:50:12CVE-2022-30190: “Follina” Microsoft Support Diagnostic Tool Vul #infosec #infosecurity #cybersecurity #threatintel… https://t.co/biEpvgtknS https://twitter.com/i/web/status/1531663173262114821CyberIQs_
2022-05-31 15:50:07Warning – Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability CVE-2022-30190 (a.k.… https://t.co/kOC87FAnCv https://twitter.com/i/web/status/1531663548732084224certbe
2022-05-31 15:40:26Rapid7 Blog | CVE-2022-30190: "Follina" Microsoft Support Diagnostic Tool Vulnerability https://t.co/BAXJ9bfgwx https://bit.ly/3lY2xuXStopMalvertisin
2022-05-31 15:40:12訳)0patchはCVE-2022-30190 "Follina"脆弱性を分析し、パッチの挿入に適した箇所を見つけました。パッチはMSDTプロトコルハンドラを完全に無効化するのではなく、現在のWindowsスクリプトで欠けている、… https://t.co/ObqqOaHwwp https://twitter.com/i/web/status/1531660681585446912__kokumoto
2022-05-31 15:40:07#Microclaudia de @CCNCERT implementa ya protección para CVE-2022-30190 https://t.co/rRgQeU0vWF https://twitter.com/esferared/status/1531605587296931842ESFERARED
2022-05-31 15:30:37We've analyzed CVE-2022-30190 "Follina" vulnerability and found a good place to inject our patch. The patch will no… https://t.co/VMgKbD0nvC https://twitter.com/i/web/status/15316574240709222400patch
2022-05-31 15:30:32CVE-2022-30190: "Follina" Microsoft Support Diagnostic Tool Vulnerability https://t.co/e7THCzVliN via Rapid7 Blog https://t.co/z3SK4mJ41o http://dlvr.it/SRN9ChAcooEdi
2022-05-31 15:30:23Micropatch for CVE-2022-30190 "Follina" will be provided for all affected Windows versions, including Windows 7, Se… https://t.co/0jcBc6WhZd https://twitter.com/i/web/status/15316582231152803860patch
2022-05-31 15:20:25Vulnerability Notice - CVE-2022-30190 More information and mitigations can be found at: https://t.co/QHjyQ01U4o… https://t.co/VzrlRQozc6 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ https://twitter.com/i/web/status/1531654255433883648CERTJersey
2022-05-31 15:11:03Microsoft has shared guidance on a remote code execution vulnerability, warning CVE-2022-30190 is being actively ex… https://t.co/xhBqppmCjZ https://twitter.com/i/web/status/1531647531481980933README_Security
2022-05-31 15:10:41https://t.co/sEAGmPeGKy CVE-2022-30190: Microsoft Office Zero-Day Vulnerability Alert #cybersecurity https://api.follow.it/track-rss-story-click/v3/tV43J6zIAWjnUkb-JZQJ43-fx8LWuXngnetsecu
2022-05-31 15:10:35This CVE-2022-30190 bug could be messy for detection, since the remote component has Javascript, there's endless po… https://t.co/Ro6kJVZJNW https://twitter.com/i/web/status/1531651379516919809tylabs
2022-05-31 15:10:31CVE-2022-30190 https://t.co/UKQQ6gKfY4 #HarsiaInfo https://har-sia.info/CVE-2022-30190.htmlHar_sia
2022-05-31 15:10:25⚠️Alerte CERT-FR⚠️ La vulnérabilité CVE-2022-30190, affectant Microsoft Windows, permet à un attaquant d'exécuter… https://t.co/y7EQFi6eZ5 https://twitter.com/i/web/status/1531652888933564418CERT_FR
2022-05-31 14:43:46Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/TtgHw65dsB https://buff.ly/3M5RGd4garyc007
2022-05-31 14:33:04[CTI] Some increased actor activities are shown targeting Microsoft Office (CVE-2022-30190) https://t.co/ly55tpOhB6 https://vuldb.com/?ctiid.200909vuldb
2022-05-31 14:23:20Microsoft releases a CVE-2022-30190 patch Undo Part 1 1- Run Command Prompt as Administrator. 2 - reg import mitigation-follinaUp365_io
2022-05-31 14:22:48Microsoft Windows Support Diagnostic Tool (MSDT) RCE Workaround Detection (CVE-2022-30190) https://t.co/L2rrli6ykt https://ift.tt/bkTC5G4cc_cyberdefence
2022-05-31 14:22:05Microsoft Office users warned against #follina , newly discovered #0day CVE-2022-30190 #cyberdefense… https://t.co/sfehlb62qJ https://twitter.com/i/web/status/1531636667911651332kiran_9543
2022-05-31 14:21:27Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) - Help Net Security - https://t.co/WCPt0K4eC4 https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/moton
2022-05-31 14:20:31Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/CEvxvmClkd https://twitter.com/i/web/status/1531641256601952257DukeNukm
2022-05-31 14:20:23#Threat_Research New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)… https://t.co/wl7xkZm935 https://twitter.com/i/web/status/1531637335531585544ksg93rd
2022-05-31 14:03:25CVE-2022-30190 (Folina) is a very crazy non-memory type vulnerability, I think it is stronger than CVE-2021-40444,… https://t.co/ePdPoKDrht https://twitter.com/i/web/status/153163525164608307280vul
2022-05-31 14:02:59Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/T37rOMQA17… https://t.co/M7V33duTaG https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/ https://twitter.com/i/web/status/1531635713623707648CeptBiro
2022-05-31 14:01:12CVE-2022-30190 is not 0day, it's just a variant of cve-2021-40444, stop the PR hype it's called 0DAY, it's just a b… https://t.co/yFeFW3zQMg https://twitter.com/i/web/status/1531611903054991362unname2096
2022-05-31 13:57:25For those who haven’t seen Follina, CVE-2022-30190, be careful about opening DOC files in email attachments. The… https://t.co/PgLfTb5pbJ https://twitter.com/i/web/status/1531631999542255617hackinraccoon
2022-05-31 13:57:02Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/yG5Nd2fMmG… https://t.co/N2Y7m7v0BU https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/ https://twitter.com/i/web/status/1531632005271658497ReneRobichaud
2022-05-31 13:53:41@buffaloverflow I would like to ask whether the wild samples of CVE-2022-30190 were discovered first by you or by t… https://t.co/vaMZaf6Vpe https://twitter.com/i/web/status/1531632918875226112unname2096
2022-05-31 13:51:40Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – ... mas info aqui https://t.co/7dhpnkVEKB https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/FINSIN_CL
2022-05-31 13:50:26ゼロデイ脆弱性CVE-2022-30190 例えばWord文書のプレビューでも任意コード実行されてしまう、みたいな話になってますね。 既に悪用例の観測されている脆弱性です。 ファイルの出元ぐらいしか確認しようがないです。(シグネ… https://t.co/AHcSbi3uwS https://twitter.com/i/web/status/1531634019883814912tutco
2022-05-31 13:43:03CVE-2022-30190 is not 0day, it's just a variant of cve-2021-40444, stop the PR hype it's called 0DAY, it's just a b… https://t.co/yFeFW3zQMg https://twitter.com/i/web/status/1531611903054991362unname2096
2022-05-31 13:42:45Follina: Angriff über Word-Dokumente und ms-msdt-Protokoll (CVE-2022-30190) https://t.co/t6YW6128bc #Office… https://t.co/MbEgTZsdan https://www.borncity.com/blog/2022/05/31/follina-angriff-ber-word-dokumente-und-ms-msdt-protokoll-cve-2022-30190/ https://twitter.com/i/web/status/1531630117461667840etguenni
2022-05-31 13:42:26The zero-day Follina MSDT vulnerability – how to fix CVE-2022-30190 #infosec #infosecurity #cybersecurity… https://t.co/EXBNOVMoiE https://twitter.com/i/web/status/1531630137300733954CyberIQs_
2022-05-31 13:40:50CVE-2022-30190 "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability" has mitigatio… https://t.co/H9w3P9hFa9 https://twitter.com/i/web/status/1531631519680299008hackerfantastic
2022-05-31 13:35:23OK, hi. This is me screaming. Thanks... CVE-2022-30190. https://t.co/hnFjiEh2Eq https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/safe_secs
2022-05-31 13:22:56#follina es ya CVE-2022-30190 Parece que por ahora la primera linea de defensa menos intrusiva sera que los antivi… https://t.co/pJnTp4YmQN https://twitter.com/i/web/status/1531624783573655555hmier
2022-05-31 13:22:14Morning everyone! Hope you all have a great week and don't have too much stress with MSDT CVE-2022-30190Djax_Alpha
2022-05-31 13:14:08Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-30190: 3.9M (audience size) CVE-2021-40444: 1.1M CVE-2022-229… https://t.co/uBVmXygXCh https://twitter.com/i/web/status/1531621526574882820CVEtrends
2022-05-31 13:13:49Be aware: A very dangerous 0-day exploit for Microsoft Office (CVE-2022-30190 aka Follina) was announced last night… https://t.co/8V6BPmSKhY https://twitter.com/i/web/status/1531621882918842371NeuwaysIT
2022-05-31 13:05:05just by opening Office file with #CVE-2022-30190💀 https://t.co/eX0dA00eoffaisal_almetab
2022-05-31 13:04:33#Microsoft #Office #Zero-Day ms-msdt #CVE-2022-30190: you can do more than just open a calculator !!! Reverse Shell… https://t.co/g3TEe29DCM https://twitter.com/i/web/status/1531619447387181057qusaialhaddad
2022-05-31 13:03:07Cyble discusses a Zero-Day Exploit of the MSDT Vulnerability CVE-2022-30190, how it can be exploited, and some work… https://t.co/wrKT1RodHX https://twitter.com/i/web/status/1531619937269207040AuCyble
2022-05-31 13:01:38早速の公式見解 / “CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center” https://t.co/6n5lOqfFXC https://htn.to/ihLMjZ2p42igaos
2022-05-31 12:41:57Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) - Help Net Security… https://t.co/eGGzMrCghz https://twitter.com/i/web/status/1531614736562855936cyberreport_io
2022-05-31 12:32:56The Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution vulnerability aka #CVE-2022-30190 found… https://t.co/en4NXXwW6v https://twitter.com/i/web/status/1531611653430722567GaborSeljan
2022-05-31 12:32:21Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/BbA48FqCdp #bugbounty, #computer, #cyber, #ethical, #hacked,… https://t.co/MLl4gzplHt https://ift.tt/hkaWzDf https://twitter.com/i/web/status/1531612077210607616Securitytemple
2022-05-31 12:31:02CVE-2022-30190 #MSDT A very good POC by @_JohnHammond Please check out his video. #CVE #Microsoft #cybersecurity… https://t.co/M4iOhqibW1 https://twitter.com/i/web/status/1531613453080612864i_m_WhiteDevil
2022-05-31 12:22:15CVE-2022-30190 Follina POC Host exploit.html on localhost, port 80. Open the docx to pop calc. To change the remo… https://t.co/1RCo27pUhF https://twitter.com/i/web/status/1531609093156311040hack_git
2022-05-31 12:21:14Follina CVE-2022-30190 #思考ダダ漏れ #思考ダダ漏れseciqRWCN
2022-05-31 12:21:04Sophos users are protected against the Office 0-day known as #Follina / MS-MSDT / CVE-2022-30190 via static and beh… https://t.co/sx367Tx7cz https://twitter.com/i/web/status/1531610266240176128felixw3000
2022-05-31 12:13:56Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability #2022 #Microsoft #Monday… https://t.co/6DCoLkbYHz https://twitter.com/i/web/status/1531606514829508608sebaenetworks
2022-05-31 12:11:18Threat Research New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) ]->… https://t.co/1nI94SHce5 https://twitter.com/i/web/status/1531608167653658629AlirezaGhahrood
2022-05-31 12:10:19#CVE-2022-30190 - RCE in Windows Support Diagnostic Tool ☑️ Wir haben auf allen Clients den von #Microsoft empfohl… https://t.co/aaE7u5gm8I https://twitter.com/i/web/status/1531608810208563200_cmd_r
2022-05-31 12:00:34@GuillermoVersus Ya le han asignado CVE ▶️ CVE-2022-30190 https://t.co/2HPvu6mHss https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/elhackernet
2022-05-31 12:00:09Top story: Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) - Help Net Security… https://t.co/PdEVg7i5t0 https://twitter.com/i/web/status/1531606415395241984Cloudusta
2022-05-31 11:51:15#ElDatoDelDía | CVE-2022-30190, vulnerabilidad de Word que, en las últimas horas, Microsoft reconoció y afirmó que… https://t.co/vJ4kCtbIE7 https://twitter.com/i/web/status/1531601443349745664FersacoSAS
2022-05-31 11:51:08Here is a good detection & emulation (utilizing ART) for (CVE-2022-30190) https://t.co/LIfDSSDqSY https://t.co/DwiqLd2cfx https://github.com/CyberCastle-Blueteam/OpenThreatDetectionRules/tree/main/Office_MSDT_1Click_Exploit https://twitter.com/GossiTheDog/status/1531011653235523586gr3yh00d
2022-05-31 11:50:37Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/qWsUx8G4pK https://youtu.be/dGCOhORNKRkMas73r
2022-05-31 11:50:34CVE-2022-30190についての日本語の記事、MSの注意喚起の内容くらいしかまとまってないのなんか悲しいなぁ。まぁ書いた人は専門職っぽくないししょうがないか_ktwr
2022-05-31 11:50:24Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/xCSRXlW52t https://cda.ms/4n5rodtrent
2022-05-31 11:50:15Windows #Follina zero day allocated CVE-2022-30190, seen in wild since April. Details, mitigations, useful links, m… https://t.co/ISkIEinr97 https://twitter.com/i/web/status/1531603583417864192StackPublishing
2022-05-31 11:42:52Microsoft Windows CVE-2022-30190 - zero day ... https://t.co/roVQjEyvF8 https://twitter.com/cyb3rops/status/1531529477192400896Redpatronus
2022-05-31 11:40:55正直今日のCVE-2022-30190の騒動はOfficeの脆弱性というのはなんか変な気がする。原理上はms-msdt:スキーマを扱えて任意のURLを叩けるアプリなら何でもって感じsun_null_ptr
2022-05-31 11:40:45⚠️Microsoft publicējis norādījumus saistībā ar jaunu “nulles dienas” ievainojamību – “Follina” (CVE-2022-30190) Off… https://t.co/YBJDCX1agh https://twitter.com/i/web/status/1531599689342148612certlv
2022-05-31 11:40:28A zero-day remote code execution (RCE) vulnerability named “Follina” (CVE-2022-30190) was found in the Microsoft Su… https://t.co/5cHUBSjhEy https://twitter.com/i/web/status/1531600487153270790Obrela
2022-05-31 11:40:25#security :: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Resp… https://t.co/iQliWHtQge https://twitter.com/i/web/status/1531600727512064001seclabor
2022-05-31 11:17:27Zero-day bug #exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/HzUvAvEyPH https://www.securecybersolution.com/zero-day-bug-exploited-by-attackers-via-macro-less-office-documents-cve-2022-30190/Sec_Cyber
2022-05-31 11:16:24Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) #vulnerability https://t.co/wZsxMGtkva https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/JParticle0
2022-05-31 11:15:44Forwarded from @Leakinfo Эксплуатация MSDT 0-Day (CVE-2022-30190) Вчера появилось бурное обсуждение уязвимости в к… https://t.co/sSXLZURjlF https://twitter.com/i/web/status/1531592631607869440gebutcher
2022-05-31 11:08:55Microsoft have released guidance for CVE-2022-30190 https://t.co/dqhEvBNPhW #cve202230190 #MSDT #follina https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/anderskortsen
2022-05-31 11:08:25Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/jWx4UEokZI https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/samilaiho
2022-05-31 11:02:43https://t.co/Y5YdSeNW98 Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) #cybersecurity https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/OSINT_info
2022-05-31 11:01:30https://t.co/odMnKYBmVm Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) #cybersecurity https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/netsecu
2022-05-31 10:58:58Microsoft Follina Vulnerability workaround #CVE-2022-30190 https://t.co/ZIedKFRJb9 https://t.co/WufQivOMb4 https://doiclickthatlink.com/critical-0-day-vulnerability-in-microsoft-office-may-2022/DoIClickThat
2022-05-31 10:57:34Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) - Help Net Security… https://t.co/r4dXfq0to1 https://twitter.com/i/web/status/1531587002365186049LanceSchukies
2022-05-31 10:52:53Microsoft has confirmed that Windows is affected by the Follina zero-day vulnerability (CVE-2022-30190), and the co… https://t.co/j60jWADsK4 https://twitter.com/i/web/status/1531587793935159296EduardKovacs
2022-05-31 10:51:57Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center… https://t.co/HtDcuVzm04 https://twitter.com/i/web/status/1531588104938590209LanceSchukies
2022-05-31 10:50:30Zero-day da Microsoft vem sendo usado em ataque. A vulnerabilidade CVE-2022-30190 está sendo ativamente usada para… https://t.co/Wf4LLkNQi5 https://twitter.com/i/web/status/1531588313047609345leverageinf
2022-05-31 10:41:34Great video about CVE-2022-30190 #Follina @_JohnHammond https://t.co/H17NpTT3sx https://twitter.com/_JohnHammond/status/1531549763191152640simon_cybersec
2022-05-31 10:40:28マイクロソフトがOfficeのFollina脆弱性(CVE-2022-30190採番)の緩和策を共有。レジストリ修正でのMSDT URLプロトコル無効化。Microsoft Defenderウイルス対策には検知シグネチャ追加。公式… https://t.co/3gF39uWOnI https://twitter.com/i/web/status/1531586188884123653__kokumoto
2022-05-31 10:34:12The CVE-2022-30190 #Follina #MSDT does not seem to work on Win10 LTSB 2016 with Office Pro Plus 2016. https://t.co/BFQc05cRYXfrancisacer1
2022-05-31 10:31:49CVE-2022-30190、なんだimportantか。criticalかと思って焦ったIris_Artemisia
2022-05-31 10:31:23Pour les intéressés : CVE-2022-30190 La guidance de Microsoft : https://t.co/DB5qCW9pAV Et vous pouvez trouver pl… https://t.co/ZAK5Z6tZNY https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability https://twitter.com/i/web/status/1531583489824411648Ackanir
2022-05-31 10:30:57Microsoft Word docs are at it again. Exploiting MSDT 0-Day CVE-2022-30190 https://t.co/V8FCCZvCUp via @YouTube https://youtu.be/dGCOhORNKRkrubbercable
2022-05-31 10:30:39Remote Code Exec in MS Office/MSDT, time to patch! // Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool… https://t.co/fPA4bLrva8 https://twitter.com/i/web/status/1531578988249899008FGRibreau
2022-05-31 10:28:47マイクロソフト社は,Microsoft Support Diagnostic Tool(MSDT)に脆弱性(CVE-2022-30190)が見つかったとして,回避策を案内しています. すでに悪用されているとのことです. 対象の場合には,回避策の適用をご検討ください.CitCsirt
2022-05-31 10:26:00Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/51EIQQ3peg https://twitter.com/i/web/status/1531579926901669888BhaavukAroraa
2022-05-31 10:22:31#securityupdate #microsoft #定例外 診断ツール Microsoft Windows Support Diagnostic Tool (MSDT) のゼロデイ脆弱性(CVE-2022-30190)を公表… https://t.co/4w64MNQKMh https://twitter.com/i/web/status/1531580501655695361kawn2020
2022-05-31 10:15:04Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/8bF5IiWNrm https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/TheCyberSecHub
2022-05-31 10:14:12CVE-2022-30190 samples 🧐 52945af1def85b171870b31fa4782e52 8ee8fe6f0226e346e224cd72c728157c (?) 6bcee92ab337c9130f2… https://t.co/8Ux93nc3C0 https://twitter.com/i/web/status/1531577100586852352buffaloverflow
2022-05-31 10:13:31CVE-2022-30190のやつ、docの検体だと外部に通信しに行って、そのレスポンスの中にms-msdtのコマンドが入っているけど、なんでdocにじかに埋め込まなかったんだろ?動かないのか、なるべく解析されないようにしたかったのか(後者かなぁ__motojiro__
2022-05-31 10:09:01Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/8cRgGiCCJq https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/blu3cloak
2022-05-31 10:05:06Oh nice, ein neuer Zero Day Exploit für Office365, CVE-2022-30190 : RCE durch Mouse-Hover über ein präp. Office Dokument. #servicetweetSuperlokkus
2022-05-31 10:04:17Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/BOErmX6yFP https://twitter.com/i/web/status/1531574952100495360ruinabadguysday
2022-05-31 09:58:16Microsoft a publié un palliatif pour la vulnérabilité "ms-msdt" (aka "Follina" ou CVE-2022-30190) qui permet à un… https://t.co/9yK5axCMKN https://twitter.com/i/web/status/1531571797967224835cert_ist
2022-05-31 09:54:25#ThreatProtection #Microsoft Windows Support Diagnostic Tool #RCE #vulnerability (CVE-2022-30190) observed in-the-w… https://t.co/87r59bpTeZ https://twitter.com/i/web/status/1531572148157956098threatintel
2022-05-31 09:51:02Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/bLpq9FESOM https://twitter.com/i/web/status/1531573588146499586fwojtek
2022-05-31 09:50:41Trending News: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Res… https://t.co/nXtDQg173C https://twitter.com/i/web/status/1531573591057260544susession
2022-05-31 09:42:28Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/3Mql17XSSJ https://www.itsecuritynews.info/zero-day-bug-exploited-by-attackers-via-macro-less-office-documents-cve-2022-30190/IT_securitynews
2022-05-31 09:42:12Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/Hp7LJc0VTk https://twitter.com/i/web/status/1531570409765740546thinksnews
2022-05-31 09:41:53#Security readings: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Securit… https://t.co/efmMGHcMZn https://twitter.com/i/web/status/1531570417001013249LinuxSec
2022-05-31 09:41:33Microsoft shares guidance on that new Office zero-day, now tracked as CVE-2022-30190 https://t.co/OwAqmtLzQ4 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/campuscodi
2022-05-31 09:41:15Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/52fy7VIr1t #news… https://t.co/2oYwxapeXG http://dlvr.it/SRM7TC https://twitter.com/i/web/status/1531570708572033026DeepFriedCyber
2022-05-31 09:36:43A new #zeroday #criticalvulnerability named #Follina (CVE-2022-30190) has been discovered which can exploit Microso… https://t.co/OcmPHiNBB6 https://twitter.com/i/web/status/1531566222546022400XMCyber_
2022-05-31 09:35:59Exploiting MSDT 0-Day CVE-2022-30190 #cve #MSDT https://t.co/47JJG4p97f https://lnkd.in/gDu9Hrdymaikosv
2022-05-31 09:34:27Pas beau du tout : CVE-2022-30190. https://t.co/k5KN7dcHR3 cc @nextinpact https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629eCellular_PP
2022-05-31 09:33:59Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/pBzm4gN5NU… https://t.co/bIO66Hf5BL http://news.poseidon-us.com/SRM5gW https://twitter.com/i/web/status/1531567301794836481PoseidonTPA
2022-05-31 09:33:42Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/jPhryMqzcS https://poseidon-us.com/2022/05/31/zero-day-bug-exploited-by-attackers-via-macro-less-office-documents-cve-2022-30190/PoseidonTPA
2022-05-31 09:33:27Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190): A newly numbered Windows zero… https://t.co/TW6ROf6r75 https://twitter.com/i/web/status/1531567676052541441cipherstorm
2022-05-31 09:32:01Help Net Security | "Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190)" https://t.co/tBHkEzgLT9 https://bit.ly/3lZnvd6joviannfeed
2022-05-31 09:31:08Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/jZlTW7AhY8 https://twitter.com/i/web/status/1531568548262338561Scott_London
2022-05-31 09:30:53Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/u2BOI8G1bd http://dlvr.it/SRM6CBXc0resecurity
2022-05-31 09:30:36Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/EsJHYvvf71 #msrc https://bit.ly/3z8MDFTSasStu
2022-05-31 09:21:55Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190): A newly numbered Windows zero… https://t.co/Kr30ZrBHgl https://twitter.com/i/web/status/1531564784734220289shah_sheikh
2022-05-31 09:21:44Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) https://t.co/UBlc4W0sqw https://t.co/rvdDl2icGb http://i.securitythinkingcap.com/SRM46mevanderburg
2022-05-31 09:21:26Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190) - https://t.co/Bbk8jlm6QT -… https://t.co/RjiNQgZoeJ https://www.helpnetsecurity.com/2022/05/31/cve-2022-30190-follina/ https://twitter.com/i/web/status/1531564968327487488helpnetsecurity
2022-05-31 09:21:01CVE-2022-30190 #Follina is yet again another example of the corrosion of vuln intel, as attempts to downplay 0day d… https://t.co/RjZ6bqyV7P https://twitter.com/i/web/status/1531565143393452034HostileSpectrum
2022-05-31 09:20:36Our IR teams are actively monitoring the Microsoft Office #Follina 0-day (CVE-2022-30190). With no patch available… https://t.co/5E63SNzfoW https://twitter.com/i/web/status/1531566023689834496smarttech247
2022-05-31 09:12:36Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/HoAKxmsRzI https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/wilfriedwoivre
2022-05-31 09:10:35Ostrzegamy przed wykorzystywaną podatnością CVE-2022-30190, która bazuje na lukach bezpieczeństwa w MS Office oraz… https://t.co/v88KIL89Dm https://twitter.com/i/web/status/1531562851361599494CERT_Polska
2022-05-31 09:01:12On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in W… https://t.co/tOl3uukfea https://twitter.com/i/web/status/1531560581353943042MisterSnags
2022-05-31 09:00:14「ms-msdt」プロトコルスキームを悪用したMicrosoft Officeに対する新しい攻撃手法(CVE-2022-30190)に関する最新情報とその対策について説明しています。 是非ご覧ください。 https://t.co/tPrQykH2Of https://www.getrevue.co/profile/sans_japan/archive/1176748SANS_JAPAN
2022-05-31 08:50:43Microsoft Office MSDT代码执行漏洞(CVE-2022-30190)通告 https://t.co/tQMGOdWcux https://t.co/Bb2gHYKOvm https://ift.tt/XjEDzCl https://ift.tt/nkpVldmbuaqbot
2022-05-31 08:40:55CVE-2022-30190たのしいSec2017
2022-05-31 08:31:14@UK_Daniel_Card @yamatosecurity @msftsecresponse Could you please change the wording on the CVE-2022-30190 Microsof… https://t.co/xlzrv9F3QR https://twitter.com/i/web/status/1531552203005116418HenkPoley
2022-05-31 08:30:59CVE-2022-30190 マイクロソフト サポート診断ツール(MSDT)の脆弱性について回避策のガイダンス Word などアプリケーションからMSDT を呼び出すと、リモートでコードが実行される脆弱性が存在します。 回避策:M… https://t.co/ZVfe6o4xC7 https://twitter.com/i/web/status/1531552392617283584t_nihonmatsu
2022-05-31 08:21:49@welivesecurity Does @ESET currently have mitigation for CVE-2022-30190? I want to know whether I need to block… https://t.co/mt0HeQUuH3 https://twitter.com/i/web/status/1531548888561496065whitewolf75
2022-05-31 08:21:24I made a video chatting about CVE-2022-30190 #Follina #MSDT vulnerability, hopefully digestible enough that you can… https://t.co/TjYtE9DCSx https://twitter.com/i/web/status/1531549763191152640_JohnHammond
2022-05-31 08:10:48On Monday 30th May, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (#MSDT) in Wind… https://t.co/2yoApvlUxB https://twitter.com/i/web/status/1531547063296704513SarahASmith75
2022-05-31 08:10:43#Cybersecurity #InfoSec #hacking Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Micr… https://t.co/PrvFgptHjS https://twitter.com/i/web/status/1531547254745604096SritaKaren
2022-05-31 08:10:08Does @ESET currently have mitigation for CVE-2022-30190? I want to know whether I need to block MSDT URL Protocol… https://t.co/osY1Bb9bKJ https://twitter.com/i/web/status/1531548486063501313whitewolf75
2022-05-31 08:00:26A new MSDT exploit CVE-2022-30190 allows for malicious Microsoft Office documents to execute arbitrary code without… https://t.co/KZrD8yMhyM https://twitter.com/i/web/status/1531545267551580161ReaQta
2022-05-31 07:52:49CVE-2022-30190 CVE-2022-30190 CVE-2022-30190 Follina POC Host exploit.html on localhost. Open the docx to pop cal… https://t.co/2psLdAoddG https://twitter.com/i/web/status/1531531562839416832VulmonFeeds
2022-05-31 07:51:50CVE-2022-30190 enables code execution from Word document. Next best vector for #Ransomware attacks? #Follina… https://t.co/Kqybi1yjrz https://twitter.com/i/web/status/1531533772809715712SagieSec
2022-05-31 07:51:41Se avete configurato Defender come consigliato, siete già protetti contro Follina (CVE-2022-30190) 😎… https://t.co/EleOSzebbC https://twitter.com/i/web/status/1531534328215359491Gabry89
2022-05-31 07:51:30Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/W1YVJtNtdr https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/Secnewsbytes
2022-05-31 07:50:39CVE-2022-30190: Microsoft Office Zero-Day Vulnerability Alert https://t.co/izzkvk7WoV #opensource #infosec #security #pentest https://securityonline.info/microsoft-office-zero-day-vulnerability/the_yellow_fall
2022-05-31 07:50:37Microsoft ออก Workarounds อุดช่องโหว่ Follina Zero-day ชั่วคราว https://t.co/PFMHjoNdqf CVE-2022-30190 https://www.techtalkthai.com/microsoft-releases-workarounds-for-follina-zero-day-vulnerability/ohmohm
2022-05-31 07:50:35Top story: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Respons… https://t.co/lFxz7pHRMA https://twitter.com/i/web/status/1531539164361277440infowaropcenter
2022-05-31 07:50:30CVE-2022-30190(MS-MSDT/Follina)、Office開いただけでコマンド実行されてしまいますね。。。 https://t.co/HkaHUGLY1Lkage6shadow
2022-05-31 07:50:25Workaround mitigation from @Microsoft for the #Follina CVE-2022-30190 #MicrosoftOffice #RCE #0day for use until a p… https://t.co/il1b6NKsew https://twitter.com/i/web/status/1531540714433261568SeanTheGeek
2022-05-31 07:50:24Office bug 0 day Follina (CVE-2022-30190) follandose a miles de pcs, el chiste facil no podía faltar.… https://t.co/tyHVF5zUjj https://twitter.com/i/web/status/1531540795408400384konata400
2022-05-31 07:50:10Microsoft has assigned CVE-2022-30190 to this. Microsoft says that Protected View or Application Guard for Office… https://t.co/bGdnBlZJ0S https://twitter.com/i/web/status/1531542631355932678fr0s7_
2022-05-31 07:32:47New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) https://t.co/x0ZwogJL4l ▫️… https://t.co/GTfcikr5f8 https://isc.sans.edu/forums/diary/New+Microsoft+Office+Attack+Vector+via+msmsdt+Protocol+Scheme/28694 https://twitter.com/i/web/status/1531534464068861953PentestingN
2022-05-31 07:22:36Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/m2mOWWPv6e https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/Securityblog
2022-05-31 07:08:48Rapid Response: Microsoft Office RCE - “Follina” MSDT Attack https://t.co/BXOq4v84lz Follina (CVE-2022-30190) の件について、かなり分かりやすく纏められてる記事。 https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bugmimura1133
2022-05-31 07:07:20#Follina CVE-2022-30190 @GossiTheDog https://t.co/EDopvLKjN0 https://t.co/Y91WrY8e4i https://twitter.com/gossithedog/status/1531431510292799494cyb3rops
2022-05-31 07:04:30Macam tu je dia bagi unofficial name untuk new CVE lol #Follina CVE-2022-30190 https://t.co/UVh2GBQqcCrahman_rzk
2022-05-31 07:01:14Follina (CVE-2022-30190) is a #zeroday #vulnerability in #MSOffice products giving attackers zero-click code execut… https://t.co/bf6xi9bfHZ https://twitter.com/i/web/status/1531523203335847937fourcorelabs
2022-05-31 06:54:55Microsoft Security Response Center Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability… https://t.co/Zx1fXiz5TW https://twitter.com/i/web/status/1531526376745971713OvidiuPismac
2022-05-31 06:43:21Microsoftさんから回避策が出てます。CVE-2022-30190。> https://t.co/DPdEhyMkNy https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/?ocid=AID740624_TWITTER_oo_spl100003139358689ando_Tw
2022-05-31 06:40:59CVE-2022-30190 workaround for the time being. Delete the ms-msdt extension association. reg delete HKEY_CLASSES_RO… https://t.co/Nq6a5Uc5qL https://twitter.com/i/web/status/1531525152856346624CyberRaiju
2022-05-31 06:11:26Ja podeu estar aplicant-ho només arribar a la feina! CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/uTQTX3rNBC https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/NandethD
2022-05-31 05:51:56#MSRC Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/kYOr27CJTO https://bit.ly/3PQzrvlSasStu
2022-05-31 05:51:12#RCE just by opening Office file with #CVE-2022-30190💀 More: https://t.co/tSJsNgDje2 https://t.co/O1u9733tV7 https://github.com/NafisiAslH/KnowledgeSharing/tree/main/CyberSecurity/Web/CVEs/CVE-2022/CVE-2022-30190MeAsHacker_HNA
2022-05-31 05:45:47Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/dnetpkMoyU https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/_CYOPS
2022-05-31 05:31:52🔥🔥🔥 with #CVE-2022-30190 you can execute command on victim system when he open #Office file 💣 More:… https://t.co/xDqj7wWc8U https://twitter.com/i/web/status/1531505959251615751MeAsHacker_HNA
2022-05-31 05:10:48CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/OKaxONwJYq https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/Sh1n_K_NO_S01aR
2022-05-31 04:51:10Microsoft Security Response Center | Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability: https://t.co/casBc4I1xS https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/versacomputing
2022-05-31 04:42:17Microsoft Windows の MSDT の処理に任意のコードを実行される問題 (CVE-2022-30190) [42374] https://t.co/LWzG4eDLWl #SIDfm #脆弱性情報 https://sid.softek.jp/content/show/42374sidfm_jp
2022-05-31 04:33:28CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/b4lx0siYG2 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/piyokango
2022-05-31 04:21:46CVE-2022-30190 になった模様。 https://t.co/Jv4kkWwXTh https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190mimura1133
2022-05-31 04:10:54https://t.co/45E6MqC40M payload generator for MS-MSDT "Follina" Attack Vector CVE-2022-30190, untested. https://github.com/JohnHammond/msdt-follinar00tpgp
2022-05-31 04:10:13Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability #cybersecurity https://t.co/v6FWGo7wpL https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/Michisan_work
2022-05-31 04:01:33CVE-2022-30190 Diagnostic Tool vulnerability MSDT in windows vulnerability. https://t.co/pwZyxB19O5CitrixDoctor
2022-05-31 04:00:17Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability via @msftsecresponse #Proficio… https://t.co/l3U4dTWoYG https://twitter.com/i/web/status/1531485625785933831proficioinc
2022-05-31 03:41:09🚨 New CVE 🚨 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability CVE-2022-30190 https://t.co/e38ktGlg9J https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190LeetCoins
2022-05-31 03:40:14【日本のセキュリティチームのブログ】 Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/DKYVqjch69 http://dlvr.it/SRLNJwazuminoICT
2022-05-31 03:21:33#Follina #CVE #Exploit #CVE-2022-30190 #threathunting #threatintelligence Attackers tested this 0day in October 20… https://t.co/DCzOHSuFhK https://twitter.com/i/web/status/1531473162701258753BaoshengbinCumt
2022-05-31 03:20:39CVE-2022-30190 is getting exploited #inthewild. Find out more at https://t.co/aF72hXouKW https://inthewild.io/vuln/CVE-2022-30190inthewildio
2022-05-31 03:11:03Now dubbed CVE-2022-30190. 🥳 https://t.co/16ASbze2NH https://t.co/MLLUl4k52r https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190 https://twitter.com/_JohnHammond/status/1531125503725289472_JohnHammond
2022-05-31 03:00:54Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability - https://t.co/tlr4qjMaY0 https://www.invisibleciso.com/17414829/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability?via=twCisoInvisible
2022-05-31 03:00:43CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/vgHUjND0SD "Word な… https://t.co/cMMWCUVFG7 https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/ https://twitter.com/i/web/status/1531469903508541440catnap707
2022-05-31 02:50:19MS-MSDT / #Follina / CVE-2022-30190の脆弱性は*相当*話題になっていますね。。Officeの最新版を使っていたら大丈夫そうですが、今後ともこのような攻撃を防ぐためにASR(攻撃面の減少ルール)の子… https://t.co/SErQTzqqSl https://twitter.com/i/web/status/1531467838820855809yamatosecurity
2022-05-31 02:50:08Microsoftの診断ツールに脆弱性(CVE-2022-30190)が発見される Wordなどから任意コードの実行の可能性 https://t.co/JMbJ8dS3I5 https://forest.watch.impress.co.jp/docs/news/1413241.htmlA_zs_Blog
2022-05-31 02:40:14公式に出したようですね。 CVE-2022-30190 - Security Update Guide - Microsoft - Microsoft Windows Support Diagnostic Tool (MSDT)… https://t.co/wsGg7sBrTG https://twitter.com/i/web/status/1531463250768175104autumn_good_35
2022-05-31 02:40:09Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center - https://t.co/FQPQpZQukq https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/moton
2022-05-31 02:30:32#Follina #CVE #Exploit #CVE-2022-30190 #Follina #TimeLine https://t.co/MBb2YJuWSv Thanks @StopMalvertisin,… https://t.co/stp17fvaLI https://docs.google.com/spreadsheets/d/1T5XAWMGNpPSwRRcTZehmOUnueODECtxnAJXJ8HjDq-Q/edit?usp=sharing https://twitter.com/i/web/status/1531460988314472448BaoshengbinCumt
2022-05-31 02:30:21CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス – Microsoft Security Response Center https://t.co/n6U4qsO5VT https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/w4yh
2022-05-31 02:20:16Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/dwsxsy3Ps0 by… https://t.co/f1DqYLwry6 https://buff.ly/3M5RGd4 https://twitter.com/i/web/status/1531459209644187648InteraxisCA
2022-05-31 02:10:10CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンス https://t.co/30L9P05ki5 アドバイザリはやい そもそも外部とのファイルの授受の経路とか根本からやれることはいっぱいありますよねってのはある https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability-jp/Wireworkes
2022-05-31 02:00:45MS has published a doc for "Follina"(CVE-2022-30190 ) which mantiond about workaroud. MSが"Follina"についてドキュメントを公開、回避策… https://t.co/WlMnl3qIua https://twitter.com/i/web/status/1531453330597105664papa_anniekey
2022-05-31 01:50:51@sec_studio Yes, CVE-2022-30190 https://t.co/yfdHCUDYRp https://twitter.com/StopMalvertisin/status/1531425330564681731StopMalvertisin
2022-05-31 01:50:48CVE-2022-30190 - Security Update Guide - Microsoft - Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code E… https://t.co/lrsH3T8yxr https://twitter.com/i/web/status/1531450988401692672ohhara_shiojiri
2022-05-31 01:50:44#Follina #CVE #Exploit #CVE-2022-30190 The first attack of this vulnerability seems to have selected the Philippine… https://t.co/eHe7WKnBM8 https://twitter.com/i/web/status/1531451290274115584BaoshengbinCumt
2022-05-31 01:50:23MSRC post with Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/zFI7ATFYTy https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/MarkSimos
2022-05-31 01:40:21Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool #infosec #infosecurity #cybersecurity #threatintel… https://t.co/HBf5FaNTFx https://twitter.com/i/web/status/1531449705724620800CyberIQs_
2022-05-31 01:40:08Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center https://t.co/IUpn8dbx8J https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ohhara_shiojiri
2022-05-31 01:31:00CVE-2022-30190 マイクロソフト サポート診断ツールの脆弱性に関するガイダンスを公開しました。企業組織の管理者は、ご参照のうえ、組織の保護をご検討ください。 https://t.co/LpyVPOkqH3 http://msft.it/6017bXz33JSECTEAM
2022-05-31 01:30:28Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/OjRNMO48Ot https://bit.ly/3z8KavkHoorge
2022-05-31 01:10:13CVE-2022-30190 defender endpointでは止めるってことなのかな?exploding_box
2022-05-31 01:10:06CVE採番されたよう(CVE-2022-30190)__motojiro__
2022-05-31 00:40:16@nao_sec #Follina -> CVE-2022-30190 https://t.co/yfdHCUDYRp https://twitter.com/StopMalvertisin/status/1531425330564681731StopMalvertisin
2022-05-31 00:40:14Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/ePSA14StbG https://www.itsecuritynews.info/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/IT_securitynews
2022-05-31 00:40:08Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability (AKA Follina/MSDT) from… https://t.co/bjZrFV6K1m https://twitter.com/i/web/status/1531434519168958465reybango
2022-05-31 00:30:22Microsoft have assigned CVE-2022-30190 to this. The blog references how Protected Mode "prevents" the attack whic… https://t.co/oq1hSacC7r https://twitter.com/i/web/status/1531431510292799494GossiTheDog
2022-05-31 00:30:18We have a #CVE for #Follina -> CVE-2022-30190 https://t.co/yfdHCUDYRp https://twitter.com/StopMalvertisin/status/1531425330564681731StopMalvertisin
2022-05-31 00:30:15Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/J7IoArHgfI https://t.co/VZrRovaRNG https://ift.tt/FYOrJdV https://ift.tt/ctPCmRxbuaqbot
2022-05-31 00:20:08If you don't understand why 4096 bytes or "!" for CVE-2022-30190, read thread on CVE-2021-40444… https://t.co/iUF2luBhAI https://twitter.com/i/web/status/1531429423907733505w3bd3vil
2022-05-31 00:10:40Microsoft Security Response Center | Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/2n3Rvpvmuh https://bit.ly/3tsZxv1StopMalvertisin
2022-05-31 00:10:16Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability... #msrc https://t.co/1a80GKn71V https://bit.ly/3NKZbr0xchachignon
2022-05-31 00:00:18Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability - Microsoft Security Response Center https://t.co/lFxbjY7Ocu https://ift.tt/FYOrJdVtsunomur
2022-05-31 00:00:16This issue (MSDT, ms-msdt, Follina, or whatever you want to call it) has been assigned CVE-2022-30190 by the way. https://t.co/hBVyA31oCh https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/wdormann
2022-05-31 00:00:14CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) in Windows vuln. An RCE vuln exists when MSDT is called vi… https://t.co/Pj0NDriuCd https://twitter.com/i/web/status/1531424547638943744holisticinfosec
2022-05-31 00:00:10[Recomendado]Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/nEoy7YCRgV… https://t.co/MTENbhrQRq https://zpr.io/CVT83dia9fcG https://twitter.com/i/web/status/1531424573584986113seguridad_si
2022-05-30 23:50:11Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://t.co/yjR4fU8gUk https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/?utm_source=dlvr.it&utm_medium=twitterRigneySec