APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Microsoft's New Approach to Office Threat Management

    There have been numerous speculations around the exploitation of MS Office in the past few years.  

    Microsoft's New Approach to Office Threat Management

    By

    Apac CIOOutlook | Thursday, January 01, 1970

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    There have been numerous speculations around the exploitation of MS Office in the past few years. Significantly enough, the number of these attacks has escalated to a noticeable high in the fall of 2017, as notified by Microsoft’s Office 365 Threat Research team in their latest advisory. The team said that they had detected an upsurge in the attempts of hackers to infiltrate systems that are running Office. This new whirl of activity can be traced to some recently-discovered exploits which are currently serving as a breeding ground for more convoluted attacks in the future.

     



    However, Microsoft’s team has been successful in tracking down four vulnerabilities, all of which have been resolved, but may still linger in enterprises that are inactive and happen to lag behind in their security procedures. While crimeware attackers usually stick to payloads like malware and information theft to gain financial profit or access sensitive information, more experienced hackers are clearly a step ahead as they use sophisticated and multi-phase implants.

    Checkout : Top Promising MS Dynamic Solution Companies

     




     
    To deal with such advanced, hi-tech risks, Microsoft introduces a portfolio of robust, cloud-based security services, Windows Defender Advanced Threat Protection, for Exchange and Office 365 users. The solution draws on machine learning and behavioral analytics to automatically thwart attacks depending on the kind of exploit and deter e-mails with unauthorized content and attachments from reaching users’ inboxes. What’s more, the Windows Defender Exploit Guard feature in the new Windows 10 Fall Creators Update prevents dubious changes to files by unknown exploits while blocking suspicious documents with its Attack Surface Reduction module.

     



    Of late, hackers have been employing the Dynamic Data Exchange (DDE) protocol to infect systems with ransomware. Notably, Office files make use of DDE to access external data sources. If used wrongly, the protocol can embed links to treacherous codes that induces Office applications to download and process hazardous malware. To this end, Microsoft directs Office users to maintain vigilance when they come across questionable e-mail attachments and pay attention to the alerts created by Office's security-enhancing Protected Mode.

     

    More in News

    Impact of Digital Transformation on Retail

    Impact of Digital Transformation on Retail

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Enhancing Customer Satisfaction through Omni-Channel Payments

    Enhancing Customer Satisfaction through Omni-Channel Payments

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/microsofts-new-approach-to-office-threat-management-nwid-4702.html