THANK YOU FOR SUBSCRIBING
Microsoft's New Approach to Office Threat Management
There have been numerous speculations around the exploitation of MS Office in the past few years.

By
Apac CIOOutlook | Thursday, January 01, 1970
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
However, Microsoft’s team has been successful in tracking down four vulnerabilities, all of which have been resolved, but may still linger in enterprises that are inactive and happen to lag behind in their security procedures. While crimeware attackers usually stick to payloads like malware and information theft to gain financial profit or access sensitive information, more experienced hackers are clearly a step ahead as they use sophisticated and multi-phase implants.
Checkout : Top Promising MS Dynamic Solution Companies
Of late, hackers have been employing the Dynamic Data Exchange (DDE) protocol to infect systems with ransomware. Notably, Office files make use of DDE to access external data sources. If used wrongly, the protocol can embed links to treacherous codes that induces Office applications to download and process hazardous malware. To this end, Microsoft directs Office users to maintain vigilance when they come across questionable e-mail attachments and pay attention to the alerts created by Office's security-enhancing Protected Mode.