Microsoft identified attacks targeting a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Active attacks make use of a Microsoft Word document that refers to a remote template file that includes malicious content to download a .cpl file and ultimately execute a DLL file that uses a .inf file extension. Following the announcement, The Cybersecurity and Infrastructure Security Agency (CISA) also encouraged users and organizations to review Microsoft’s mitigations and workarounds to address CVE-2021-40444. The Microsoft stated anyone who uses Defender Antivirus and Defender for Endpoint and enables automatic updates is safe from the vulnerability. The alerts in Microsoft Defender will show up as “Suspicious Cpl File Execution.”
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security