{"id":454,"date":"2018-05-11T11:41:00","date_gmt":"2018-05-11T11:41:00","guid":{"rendered":"http:\/\/41545b79-6dc7-42b8-bf45-3c0c59bc4b20"},"modified":"2018-05-11T11:41:00","modified_gmt":"2018-05-11T11:41:00","slug":"windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/","title":{"rendered":"Windows 10 security: Google Project Zero shreds Microsoft&#8217;s unique Edge defense"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2018\/05\/11\/4efedcd0-8cb1-4d30-b867-f1c353f97bdc\/thumbnail\/770x578\/fe1c633f14f00a77651cf5af1c5286ba\/news0503microsoftedge.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><em>Video: When it comes to malware, Windows 10 is twice as secure as Windows 7<\/em><\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Microsoft has heavily promoted the advances it&#8217;s made in Windows 10&#8217;s built-in exploit mitigations to encourage enterprise adoption, but Google&#8217;s Project Zero isn&#8217;t convinced key defenses can stand up to advanced hackers.<\/p>\n<p>Project Zero researcher Ivan Fratric has released a <a href=\"file:\/\/\/Users\/liamtung\/Downloads\/JIT-Server-whitepaper.pdf\">white paper<\/a> detailing the group&#8217;s work on undermining Windows 10 Creators Update feature Arbitrary Code Guard (ACG), when applied to Microsoft Edge.<\/p>\n<p>Currently ACG exploit mitigation is exclusive to Edge and aims to prevent advanced attackers from executing malicious code in memory if they&#8217;ve already compromised a content process in the browser.<\/p>\n<p>Fratric in February <a href=\"https:\/\/www.zdnet.com\/article\/windows-10-security-google-exposes-how-malicious-sites-can-exploit-microsoft-edge\/\">published details of an ACG Edge bypass<\/a> before Microsoft was able to fix the issue because it had exceeded the group&#8217;s strict 90-day deadline.<\/p>\n<p>The bypass undermined &#8212; and helped Microsoft improve &#8212; a customization Microsoft developed to ensure Edge&#8217;s Just in Time (JIT) JavaScript compilers worked with ACG enabled.<\/p>\n<p><strong>See:<\/strong> <a href=\"http:\/\/www.techrepublic.com\/resource-library\/whitepapers\/20-pro-tips-to-make-windows-10-work-the-way-you-want\/\" target=\"_blank\">20 pro tips to make Windows 10 work the way you want (free PDF)<\/a><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The solution required considerable effort on Microsoft&#8217;s part and involved putting Edge&#8217;s JIT engine in its own sandboxed process, separate from the browser&#8217;s content processes.<\/p>\n<p>The defense should ultimately stop advanced attackers escaping Edge&#8217;s sandbox. However, Fratric found that while ACG generally stands up to the task, it and another feature called Code Integrity Guard, are let down by a further Windows 10 exploit mitigation feature called Control Flow Guard (CFG).<\/p>\n<p>Fratric contends that for ACG to be successful at blocking all attacks, ACG, CIG and CFG all need to be impervious to bypasses. But that&#8217;s not the case with CFG, and in some attack scenarios Chrome&#8217;s site-isolation feature would be harder to bypass than Edge with ACG enabled, according to Fratric.<\/p>\n<p>&#8220;Currently, <a href=\"https:\/\/github.com\/Microsoft\/MSRC-Security-Research\/blob\/master\/presentations\/2018_02_OffensiveCon\/The%20Evolution%20of%20CFI%20Attacks%20and%20Defenses.pdf\">with a lot of known bypasses<\/a>, bypassing CFG in Windows is not difficult. However, should Microsoft be able to fix all the known weaknesses of CFG, including adding the return flow protection, the situation might change in the next couple of years. As Microsoft already showed intention to do this, we believe this is their long-term plan,&#8221; he notes.<\/p>\n<p>He continues later: &#8220;ACG does succeed to fulfill its purpose of preventing executable memory from being allocated and modified. However, due to mutual dependence of CFG, ACG and CIG and the shortcomings of CFG in Microsoft Windows, ACG alone can&#8217;t be sufficient to stop advanced attackers from escaping a browser&#8217;s sandbox and mounting other attacks.&#8221;<\/p>\n<p>Google&#8217;s Chrome developers see site-isolation, which involves running each site in its own sandboxed process, as the <a href=\"https:\/\/www.zdnet.com\/article\/chrome-63-vs-windows-10-edge-google-steps-up-rivalry-with-site-isolation-security\/\">key difference between Edge and Chrome<\/a> on the exploit-mitigation front. The problem with site isolation is that it causes between 10 and 20 percent higher memory usage.<\/p>\n<p>However, overall Fratric believes that Microsoft&#8217;s customizations that enabled ACG for Edge are inherently flawed.<\/p>\n<p>&#8220;While the paper focuses on Microsoft Edge, we believe that any other attempt to implement out-of-process JIT would encounter similar problems,&#8221; Fratric <a href=\"https:\/\/googleprojectzero.blogspot.com.es\/2018\/05\/bypassing-mitigations-by-attacking-jit.html\">notes in a blogpost<\/a>.<\/p>\n<p>ZDNet has contacted Microsoft for its comments and will post its response should one be received.<\/p>\n<h3>Previous and related coverage<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/windows-10-security-google-exposes-how-malicious-sites-can-exploit-microsoft-edge\/\">Windows 10 security: Google exposes how malicious sites can exploit Microsoft Edge<\/a><\/strong><\/p>\n<p>Microsoft misses Google&#8217;s 90-day deadline, so Google has published details of an exploit mitigation bypass.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/windows-10-bug-google-again-reveals-code-for-important-unpatched-flaw\/\">Windows 10 bug: Google again reveals code for &#8216;important&#8217; unpatched flaw<\/a><\/strong><\/p>\n<p>For the second time in a week, Google reveals another unpatched Windows 10 vulnerability.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/linux-security-google-fuzzer-finds-ton-of-holes-in-kernels-usb-subsystem\/\">Linux security: Google fuzzer finds ton of holes in kernel&#8217;s USB subsystem<\/a><\/strong><\/p>\n<p>A Google-developed kernel fuzzer has helped locate dozens of Linux security flaws.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/google-reveals-trio-of-speculative-execution-flaws-says-amd-affected\/\">Google reveals trio of speculative execution flaws, says AMD affected<\/a><\/strong><\/p>\n<p>CPUs can leak data when unwinding unused speculative execution paths.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Project Zero says Microsoft&#8217;s Arbitrary Code Guard in Edge fails where Chrome&#8217;s site isolation succeeds.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":455,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows 10 security: Google Project Zero shreds Microsoft&#039;s unique Edge defense 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows 10 security: Google Project Zero shreds Microsoft&#039;s unique Edge defense 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-11T11:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Windows 10 security: Google Project Zero shreds Microsoft&#8217;s unique Edge defense\",\"datePublished\":\"2018-05-11T11:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/\"},\"wordCount\":638,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/\",\"name\":\"Windows 10 security: Google Project Zero shreds Microsoft's unique Edge defense 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg\",\"datePublished\":\"2018-05-11T11:41:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows 10 security: Google Project Zero shreds Microsoft&#8217;s unique Edge defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows 10 security: Google Project Zero shreds Microsoft's unique Edge defense 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/","og_locale":"en_US","og_type":"article","og_title":"Windows 10 security: Google Project Zero shreds Microsoft's unique Edge defense 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-11T11:41:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Windows 10 security: Google Project Zero shreds Microsoft&#8217;s unique Edge defense","datePublished":"2018-05-11T11:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/"},"wordCount":638,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/","url":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/","name":"Windows 10 security: Google Project Zero shreds Microsoft's unique Edge defense 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg","datePublished":"2018-05-11T11:41:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-security-google-project-zero-shreds-microsofts-unique-edge-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows 10 security: Google Project Zero shreds Microsoft&#8217;s unique Edge defense"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=454"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/454\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/455"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}