{"id":32836,"date":"2020-01-18T01:17:54","date_gmt":"2020-01-18T01:17:54","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/"},"modified":"2020-01-18T01:17:54","modified_gmt":"2020-01-18T01:17:54","slug":"its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/","title":{"rendered":"It&#8217;s Friday, the weekend has landed&#8230; and Microsoft warns of an Internet Explorer zero day exploited in the wild"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/04\/07\/shutterstock_malware.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> Welcome to another <em>Reg<\/em> roundup of security news.<\/p>\n<h3 class=\"crosshead\"><span>Still using Internet Explorer? Don&#8217;t. There&#8217;s another zero-day<\/span><\/h3>\n<p>Microsoft let slip on Friday an advisory detailing an <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV200001\">under-attack zero-day<\/a> vulnerability (CVE-2020-0674) for Internet Explorer. The scripting engine flaw can be exploited to gain remote code execution on a vulnerable machine by way of a specially crafted webpage. The flaw can be mitigated by restricting access to the JavaScript component JScript.dll, and thus far there is no patch available.<\/p>\n<p>&#8220;Microsoft is aware of this vulnerability and working on a fix,&#8221; the software giant noted.<\/p>\n<p>&#8220;Our standard policy is to release security updates on Update Tuesday, the second Tuesday of each month. This predictable schedule allows for partner quality assurance and IT planning, which helps maintain the Windows ecosystem as a reliable, secure choice for our customers. Microsoft is aware of limited targeted attacks.&#8221;<\/p>\n<p>Unless you&#8217;re an enterprise still requiring IE for various apps, you should really consider moving off Exploder at this point. If you want to stay with Microsoft, there is the new Edge browser, or you can opt for Chrome, Firefox, Opera, Brave, or any number of other browser options.<\/p>\n<div class=\"boxout\" readability=\"10.19512195122\">\n<p><strong>In brief&#8230;<\/strong> A poorly configured Elasticsearch database left an app&#8217;s baby photos and videos <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.databreachtoday.com\/babys-first-data-breach-app-exposes-baby-photos-videos-a-13603\">accessible<\/a> from the public internet. AMD has <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/InstLatX64\/status\/1217722370149974017\">proposed<\/a> SEV-SNP, that&#8217;s Secure Nested Pages, to further protect virtual machines from malicious cloud hosts.<\/p>\n<\/div>\n<h3 class=\"crosshead\"><span>MageCart crooks infect Australian fire fundraisers<\/span><\/h3>\n<p>An Australian family-run fishing gear shop raising money online for nearby Aussies caught up in the season&#8217;s devastating bush fires was among those hit by the latest wave of MageCart infections this month.<\/p>\n<p>Fergo&#8217;s Tackle, based in Wollongong and Taren Point, in New South Wales, set up a page on its equipment web store where customers could <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/fergostackleworld.com.au\/bushfire-appeal-donations.html\">donate<\/a> cash via purchases, with the promise that &#8220;100% of all donations will go towards buying essential items (food, bedding, clothing, shelter etc.) for the victims of the fires&#8221; in Lake Conjola.<\/p>\n<p>In a cruel twist of fate, the site \u2013 like many others \u2013 was infected by a variant of the card-skimming malware MageCart, as spotted by The Malwarebytes Threat Intelligence Team and confirmed by <em>El Reg<\/em>.<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"7.0300429184549\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Magecart?src=hash&amp;ref_src=twsrc%5Etfw\">#Magecart<\/a> skimmer stealing from folks donating to Australia&#8217;s bushfire effort.<\/p>\n<p>Skimmer is &#8216;ATMZOW&#8217;, exfiltration domain vamberlo[.]com was already known. <a href=\"https:\/\/t.co\/1qwPqSPEQm\">pic.twitter.com\/1qwPqSPEQm<\/a><\/p>\n<p>\u2014 MB Threat Intel (@MBThreatIntel) <a href=\"https:\/\/twitter.com\/MBThreatIntel\/status\/1215693928764063744?ref_src=twsrc%5Etfw\">January 10, 2020<\/a><\/p><\/blockquote>\n<p>The shop has told <em>The Register<\/em> the offending code has been removed, which is true. Malwarebytes says the domain being used to aggregate the card data collected by the scripts has also been taken down. So hopefully all the other sites that this strain of Magecart are also now protected.<\/p>\n<h3 class=\"crosshead\"><span>Grindr accused of misusing personal data<\/span><\/h3>\n<p><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.forbrukerradet.no\/side\/new-study-the-advertising-industry-is-systematically-breaking-the-law\/\">A report<\/a> out of Norway claims that dating app Grindr &#8211; and a handful of other mobile apps &#8211; are illegally exposing user information to third-party advertisers.<\/p>\n<p>The report claims that a violation of GDPR has occurred in the way the apps collect user habits and then sell them to advertisers who use the information to create detailed profiles on users.<\/p>\n<p>&#8220;There are very few actions consumers can take to limit or prevent the massive tracking and data sharing that is happening all across the internet,&#8221; the report reads.<\/p>\n<p>&#8220;Authorities must take active enforcement measures to protect consumers against the illegal exploitation of personal data.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>WeLeakInfo no longer living up to its name<\/span><\/h3>\n<p>US prosecutors say that the FBI has <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.justice.gov\/usao-dc\/pr\/weleakinfocom-domain-name-seized\">seized the domain<\/a> of pilfered data-selling site WeLeakInfo.<\/p>\n<p>The FBI joined a number of European law enforcement agencies to take down both the site and its operators: police in Northern Ireland and the Netherlands have arrested people they believe to be the administrators of the site.<\/p>\n<p>&#8220;The website had claimed to provide its users a search engine to review and obtain the personal information illegally obtained in over 10,000 data breaches containing over 12 billion indexed records \u2013 including, for example, names, email addresses, usernames, phone numbers, and passwords for online accounts,&#8221; prosecutors said of the site.<\/p>\n<p>&#8220;The website sold subscriptions so that any user could access the results of these data breaches, with subscriptions providing unlimited searches and access during the subscription period (one day, one week, one month, or three months).&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Georgia election server hacked in 2014<\/span><\/h3>\n<p>A new revelation has emerged in the battle over paperless voting systems in the US state of Georgia.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.politico.com\/news\/2020\/01\/16\/georgia-election-systems-could-have-been-hacked-before-2016-vote-100334\">Politico<\/a> reports that researchers found that, in 2014, one of the servers handling election reports was hacked.<\/p>\n<p>While there is no evidence directly showing that elections were compromised, that hacked browser was used to handle results in both the 2016 and 2018 elections.<\/p>\n<h3 class=\"crosshead\"><span>FBI to notify US states of local election hacks<\/span><\/h3>\n<p>US state governments will now be informed when one of their city or county governments fall victim to election system hacks.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/thehill.com\/policy\/cybersecurity\/478669-fbi-announces-new-policy-for-notifying-state-local-election-officials-of\">The Hill<\/a> reports that an internal directive at the FBI instructs agents to make sure state governments (if they don&#8217;t already know) get word any time a network intrusion is reported.<\/p>\n<p>While it&#8217;s hard to imagine a scenario where a local government doesn&#8217;t see fit to notify their state about an attack, the procedure will hopefully prevent any potential incidents from slipping through the cracks.<\/p>\n<h3 class=\"crosshead\"><span>Stop us if you&#8217;ve heard this one: malicious apps sneak into Play Store<\/span><\/h3>\n<p>Yep, once again we have a report of an Android malware outbreak.<\/p>\n<p>The team at <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/labs.bitdefender.com\/2020\/01\/seventeen-android-nasties-spotted-in-google-play-total-over-550k-downloads\/\">BitDefender says<\/a> it helped Google spot and remove 17 apps that were spreading &#8220;aggressive ads&#8221; on user devices once installed.<\/p>\n<p>&#8220;While not malicious per se, the tactics they use to smuggle themselves into Google Play and dodge Google\u2019s vetting system are traditionally associated with malware,&#8221; said BitDefender.<\/p>\n<p>The 17 apps had an estimated 550,000 combined downloads. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1889\/-8120\/detecting-cyber-attacks-as-a-small-to-medium-business?td=wptl1889\">Detecting cyber attacks as a small to medium business<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/01\/18\/roundup_january_17\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus, WeLeakInfo? Not anymore! Roundup\u00a0 Welcome to another Reg roundup of security news.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32837,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-32836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>It&#039;s Friday, the weekend has landed... and Microsoft warns of an Internet Explorer zero day exploited in the wild 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It&#039;s Friday, the weekend has landed... and Microsoft warns of an Internet Explorer zero day exploited in the wild 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-18T01:17:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"It&#8217;s Friday, the weekend has landed&#8230; and Microsoft warns of an Internet Explorer zero day exploited in the wild\",\"datePublished\":\"2020-01-18T01:17:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/\"},\"wordCount\":976,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/\",\"name\":\"It's Friday, the weekend has landed... and Microsoft warns of an Internet Explorer zero day exploited in the wild 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg\",\"datePublished\":\"2020-01-18T01:17:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg\",\"width\":648,\"height\":433},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It&#8217;s Friday, the weekend has landed&#8230; and Microsoft warns of an Internet Explorer zero day exploited in the wild\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"It's Friday, the weekend has landed... and Microsoft warns of an Internet Explorer zero day exploited in the wild 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/","og_locale":"en_US","og_type":"article","og_title":"It's Friday, the weekend has landed... and Microsoft warns of an Internet Explorer zero day exploited in the wild 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-18T01:17:54+00:00","og_image":[{"width":648,"height":433,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"It&#8217;s Friday, the weekend has landed&#8230; and Microsoft warns of an Internet Explorer zero day exploited in the wild","datePublished":"2020-01-18T01:17:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/"},"wordCount":976,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/","url":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/","name":"It's Friday, the weekend has landed... and Microsoft warns of an Internet Explorer zero day exploited in the wild 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg","datePublished":"2020-01-18T01:17:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild.jpg","width":648,"height":433},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/its-friday-the-weekend-has-landed-and-microsoft-warns-of-an-internet-explorer-zero-day-exploited-in-the-wild\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"It&#8217;s Friday, the weekend has landed&#8230; and Microsoft warns of an Internet Explorer zero day exploited in the wild"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32836"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32837"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}