{"id":49650,"date":"2022-12-08T15:19:00","date_gmt":"2022-12-08T15:19:00","guid":{"rendered":"http:\/\/d9a7e0ec-baf5-4493-86ba-5560b6a34272"},"modified":"2022-12-08T15:19:00","modified_gmt":"2022-12-08T15:19:00","slug":"hackers-are-still-finding-and-using-flaws-in-internet-explorer","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/","title":{"rendered":"Hackers are still finding &#8211; and using &#8211; flaws in Internet Explorer"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/65ff527a9c2354bc43234cecbb306207f27ec339\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=768\" alt=\"hacker-hands-typing-on-a-keyboard.jpg\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f4c7dd52cbe631eb84ace3499350962d345b298c\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1024\" alt=\"hacker-hands-typing-on-a-keyboard.jpg\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280\" alt=\"hacker-hands-typing-on-a-keyboard.jpg\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280\" alt=\"hacker-hands-typing-on-a-keyboard.jpg\" width=\"1280\" height=\"853.3333333333333\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty<\/span><\/figcaption><\/figure>\n<p>Google has filled in the blanks about a curious zero-day flaw that Microsoft addressed in its November Patch Tuesday.&nbsp;<\/p>\n<p>The remote code execution flaw, tracked as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41128\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CVE-2022-41128,<\/a> was in one of its Windows JavaScript scripting languages, JScript9 \u2013 the JavaScript engine used in IE 11. The bug affected Windows 7 through to Windows 11, as well as Windows Server 2008 through 2022.&nbsp;<\/p>\n<p>Microsoft <a href=\"https:\/\/www.zdnet.com\/home-and-office\/work-life\/microsofts-internet-explorer-browser-is-finally-gone-not-everyone-is-a-happy-about-it\/\" rel=\"follow\">ended support for IE 11 on June 15, 2022<\/a>, and has been encouraging customers to use Edge instead with &#8216;IE mode&#8217;. But Google has found this type of IE bug continues to be exploited in Office documents because the IE engine remains integrated with Office. &nbsp;<\/p>\n<p>And who were the actors behind the newly discovered exploit for legacy IE 11?<\/p>\n<p>According to TAG members Clement Lecigne (who reported the flaw to Microsoft) and Benoit Sevens, the IE exploit was developed by North Korean actors APT37.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-jobs-five-ways-to-help-you-build-your-career\/\" rel=\"follow\">Cybersecurity jobs: Five ways to help you build your career<\/a><\/strong><\/p>\n<p>The attackers distributed the IE exploit in an Office document because, as TAG explains, Office renders HTML content using IE. IE exploits have been delivered via Office since 2017 for this reason because, even if Chrome is set as the default, Office defaults to the IE engine when it encounters HTML or web content.<\/p>\n<p>&#8220;Delivering IE exploits via this vector has the advantage of not requiring the target to use Internet Explorer as its default browser, nor to chain the exploit with an EPM sandbox escape,&#8221; the threat analysts note.&nbsp;<\/p>\n<p>They also note that this flaw is very similar to the bug, CVE-2021-34480, that Google Project Zero (GPZ) found last year in IE 11&#8217;s JIT compiler. GPZ&#8217;s <a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2022\/CVE-2022-41128.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">analysis of the new IE flaw<\/a> also traced it to IE&#8217;s JIT compiler.&nbsp;<\/p>\n<p>At the time, GPZ researcher Ivan Fratric noted that, although Microsoft had ended support for IE 11, IE (or the IE engine) was <a href=\"https:\/\/googleprojectzero.blogspot.com\/2021\/09\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">still integrated into other products, most notably, Microsoft Office<\/a>. Due to that still-existing integration, Fratric wondered how long it would take before attackers stopped abusing it.&nbsp;<\/p>\n<p>TAG notes that in a typical scenario, when an IE exploit is delivered in an Office document, the user would have to disable Office Protected View before the remote RTF is fetched.<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/what-is-a-ciso-everything-you-need-to-know-about-the-chief-information-security-officer\/\" rel=\"follow\"><strong>What is a CISO? Everything you need to know about the Chief Information Security Officer role<\/strong><\/a><\/p>\n<p>TAG didn&#8217;t find the final payload for this campaign. However, TAG noted that APT37 (also known as ScarCruft and Reaper) has used several implants like <a href=\"https:\/\/blog.talosintelligence.com\/rokrat-reloaded\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ROKRAT<\/a>, <a href=\"https:\/\/www.volexity.com\/blog\/2021\/08\/24\/north-korean-bluelight-special-inkysquid-deploys-rokrat\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">BLUELIGHT<\/a>, and <a href=\"https:\/\/www.welivesecurity.com\/2022\/11\/30\/whos-swimming-south-korean-waters-meet-scarcrufts-dolphin\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">DOLPHIN<\/a>.<\/p>\n<p>&#8220;APT37 implants typically abuse legitimate cloud services as a C2 channel and offer capabilities typical of most backdoors,&#8221; TAG notes.&nbsp;<\/p>\n<p>TAG also commended Microsoft for the quick patch, which it delivered eight days after Google first analyzed the malicious Office file from VirusTotal.<\/p>\n<div id=\"pinbox-d9a7e0ec-baf5-4493-86ba-5560b6a34272\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">More Microsoft<\/h4>\n<p> <!----> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The hackers delivered an IE exploit in an emailed Office document, which renders web content in IE even if it is not the default browser.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-49650","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers are still finding - and using - flaws in Internet Explorer 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers are still finding - and using - flaws in Internet Explorer 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-08T15:19:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers are still finding &#8211; and using &#8211; flaws in Internet Explorer\",\"datePublished\":\"2022-12-08T15:19:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/\"},\"wordCount\":477,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/24938a3188be284d03f1b62bc73c93c3be0b5f22\\\/2021\\\/12\\\/06\\\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\\\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/\",\"name\":\"Hackers are still finding - and using - flaws in Internet Explorer 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/24938a3188be284d03f1b62bc73c93c3be0b5f22\\\/2021\\\/12\\\/06\\\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\\\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2022-12-08T15:19:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/24938a3188be284d03f1b62bc73c93c3be0b5f22\\\/2021\\\/12\\\/06\\\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\\\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/24938a3188be284d03f1b62bc73c93c3be0b5f22\\\/2021\\\/12\\\/06\\\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\\\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers are still finding &#8211; and using &#8211; flaws in Internet Explorer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers are still finding - and using - flaws in Internet Explorer 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/","og_locale":"en_US","og_type":"article","og_title":"Hackers are still finding - and using - flaws in Internet Explorer 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-12-08T15:19:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers are still finding &#8211; and using &#8211; flaws in Internet Explorer","datePublished":"2022-12-08T15:19:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/"},"wordCount":477,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/","name":"Hackers are still finding - and using - flaws in Internet Explorer 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280","datePublished":"2022-12-08T15:19:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/24938a3188be284d03f1b62bc73c93c3be0b5f22\/2021\/12\/06\/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195\/hacker-hands-typing-on-a-keyboard.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-are-still-finding-and-using-flaws-in-internet-explorer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers are still finding &#8211; and using &#8211; flaws in Internet Explorer"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49650"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49650\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}