It’s been a while since we’ve seen the kind of drama surrounding a Microsoft zero-day bug that we saw this week with the Word vulnerability. Details of the flaw began emerging last week and attackers have been targeting it for several months, but Microsoft didn’t saw a thing about it publicly until it patched the bug on Tuesday. This is a reversal from the way the company used to handle these things, and to help make sense of what’s going on Dennis Fisher talked with Mike Mimoso of Threatpost about the vulnerability and why Microsoft has apparently gone backwards on its security response process.
Music by Chris Gonsalves and Ken Montigny
Written by: Mike Yang
- 04.13.17
Recent Posts
- Evaluating Your Defense Strategy Against Deepfakes: Top 4 Factors to Prioritize
- Unmatched Performance: Pindrop’s Liveness Detection and the Waterloo Study
- Exposing the Truth About Zero-Day Deepfake Attacks: Meta’s Voicebox Case Study
- IVR/IVA Authentication Methods
- Real-time Deepfake Detection of Senator Bluementhal’s Remarks at AI Committee