The 5 Microsoft Office Zero-Days Behind a Surge in Recent Attacks

microsoft-office-zero-day-vulnerabilities-2018-2017

Exploits are valuable commodities among bad actors. Unlike social engineering, exploits don’t require human interaction, though malefactors do sometimes deploy them with the help of phishing emails earlier in the infection chain. Exploits are simple because they take advantage of a software bug or vulnerability; this security weakness gives attackers their opening.

Article Link: https://blog.barkly.com/microsoft-office-zero-day-vulnerabilities-2017-2018-attacks