Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. The software company is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.
What exactly does all that mean for MSPs and MSSPs that are striving to safeguard Windows-based systems and Office applications for end-customers?
Here are two perspectives to track:
- MDR (managed detection and response) service provider Huntress -- which works closely with MSPs -- offers this guidance.
- Bryson Medlock, a threat researcher at Perch Security and manager of ConnectWise's cyber research unit, shares perspectives about the vulnerability with The Cyber Nation founder Andrew Morgan in the video below.