Arnold Osipov (@osipov_ar) 's Twitter Profile
Arnold Osipov

@osipov_ar

Security Researcher @Morphisec | Former - Check Point Research | RE, Malware & Threat hunting | Software Engineer.

ID: 2860316952

calendar_today17-10-2014 13:21:23

267 Tweet

1,1K Followers

421 Following

Michael.Gorelik (@smgoreli) 's Twitter Profile Photo

Join me, Arnold Osipov and Shmuel Uzan at #DEFCON32 this year for our presentation, "Outlook Unleashing RCE Chaos: CVE-2024-30103" where we'll share technical details and a POC. We will be revealing additional RCEs once they are patched. You should patch your devices today!

Arnold Osipov (@osipov_ar) 's Twitter Profile Photo

Check out this #phishing #PDF posing as a #CrowdStrike updater for Windows hosts. It originates from the #Handala_Machine and ultimately delivers a #wiper using a variant of #CypherIT. PDF: cdfa4966d7a859b09a411f0d90efbf822b2d6671 ZIP: 66fbe2b33e545062a1399a4962b9af4fbbd4b356

Check out this #phishing #PDF posing as a #CrowdStrike updater for Windows hosts. 
It originates from the #Handala_Machine and ultimately delivers a #wiper using a variant of #CypherIT. 

PDF: cdfa4966d7a859b09a411f0d90efbf822b2d6671
ZIP: 66fbe2b33e545062a1399a4962b9af4fbbd4b356
Arnold Osipov (@osipov_ar) 's Twitter Profile Photo

Super excited to get into the Q2 top 10 Office researchers! 🎉 Security Response - Thank you for the opportunity 🙏 #CyberSecurity #Research #Microsoft

Super excited to get into the Q2 top 10 Office researchers! 🎉 <a href="/msftsecresponse/">Security Response</a> - Thank you for the opportunity 🙏 #CyberSecurity #Research #Microsoft
Arnold Osipov (@osipov_ar) 's Twitter Profile Photo

Don't forget to patch - CVE-2024-38173 Our latest RCE discovery in Outlook msrc.microsoft.com/update-guide/e… #CVE #RCE

Morphisec (@morphisec) 's Twitter Profile Photo

📩 Arnold Osipov & Michael.Gorelik have uncovered and aided Microsoft in patching another Outlook vulnerability, CVE-2025-21357. 🔎 See the details in our brand new web experience: bit.ly/40AqTA3 #cybersecurity #outlook #microsoft #cyber #patchtuesday

Arnold Osipov (@osipov_ar) 's Twitter Profile Photo

🚀 Thrilled to share that I’ve been invited to Microsoft’s Zero Day Quest event in Redmond, Washington in 2025! 🔥 Over the past year, I’ve reported 4 RCE vulnerabilities and several other security issues to MSRC. Big thanks to Security Response for organizing this unique event!

🚀 Thrilled to share that I’ve been invited to Microsoft’s Zero Day Quest event in Redmond, Washington in 2025! 🔥

Over the past year, I’ve reported 4 RCE vulnerabilities and several other security issues to MSRC.
Big thanks to <a href="/msftsecresponse/">Security Response</a> for organizing this unique event!
Security Response (@msftsecresponse) 's Twitter Profile Photo

Day 1 of the Zero Day Quest Onsite Hacking Event is in the books and we’ve kicked off Day 2. We welcomed top security researchers from around the world to Microsoft’s Redmond campus for a day of live hacking, collaboration, and connection. Researchers worked side-by-side with

Day 1 of the Zero Day Quest Onsite Hacking Event is in the books and we’ve kicked off Day 2.

We welcomed top security researchers from around the world to Microsoft’s Redmond campus for a day of live hacking, collaboration, and connection.
 
Researchers worked side-by-side with
Security Response (@msftsecresponse) 's Twitter Profile Photo

Day 2 of #ZeroDayQuest brought even more hacking, problem-solving, and unforgettable moments. We then went to Carmine’s for incredible food and even better conversation, connecting over exploits, defense strategies, and a shared passion for protecting customers.

Day 2 of #ZeroDayQuest brought even more hacking, problem-solving, and unforgettable moments.

We then went to Carmine’s for incredible food and even better conversation, connecting over exploits, defense strategies, and a shared passion for protecting customers.
Security Response (@msftsecresponse) 's Twitter Profile Photo

Day 2 of #ZeroDayQuest brought together brilliant minds from around the world for more hands-on hacking and meaningful community connections. Catch the energy in our recap video! Tom Gallagher Jeremy Tinder Wendy [email protected]

Nadav Lorber (@lnadav) 's Twitter Profile Photo

Joining the MCP trend with windbg-ext-mcp 🐛Now you can vibe debugging your Windows kernel: github.com/NadavLor/windb… Example of asking Claude to hide explorer.exe by unlinking it from EPROCESS + PspCidTable: #windbg #mcp

Joining the MCP trend with windbg-ext-mcp 🐛Now you can vibe debugging your Windows kernel:
github.com/NadavLor/windb…

Example of asking Claude to hide explorer.exe by unlinking it from EPROCESS + PspCidTable:
#windbg #mcp
Arnold Osipov (@osipov_ar) 's Twitter Profile Photo

Yesterday, Microsoft patched two Remote Code Execution vulnerabilities in Outlook that we discovered. 🙃 1. CVE-2025-47171 --> msrc.microsoft.com/update-guide/e… 2. CVE-2025-47176 --> msrc.microsoft.com/update-guide/e… ⚠️ More findings on the way — stay tuned.

Arnold Osipov (@osipov_ar) 's Twitter Profile Photo

Proud to share that Michael.Gorelik and my talk, “Signature of Destruction: Outlook RCE Strikes Again”, got accepted to BlackHat Canada (SecTor)! New Outlook RCE, new vector — details soon #sectorca Black Hat

Proud to share that <a href="/smgoreli/">Michael.Gorelik</a> and my talk, “Signature of Destruction: Outlook RCE Strikes Again”, got accepted to BlackHat Canada (SecTor)!
New Outlook RCE, new vector — details soon

#sectorca <a href="/BlackHatEvents/">Black Hat</a>