Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Microsoft Updates IE Mode In Edge

October 14, 2025
Reading Time: 2 mins read
in News
JPMorgan To Invest In US Security Firms

The Internet Explorer (IE) mode in Microsoft Edge serves a vital role for organizations, allowing them to render older Internet Explorer 11-based websites and applications within the modern Edge browser. This feature is designed to simplify the IT environment, ensuring continued access to essential legacy services while standardizing on a single, modern platform for newer web applications.

The vulnerability came to light in August 2025 when threat actors began actively exploiting it. While Microsoft did not immediately release technical specifics regarding the attackers’ identity or the full extent of the operations, the method of exploitation was confirmed. It relied on a combination of social engineering tactics and the use of unpatched zero-day flaws within Internet Explorer’s legacy Chakra JavaScript engine.

The attack chain was highly sophisticated, starting with tricking users into visiting a spoofed, official-looking website. From there, the attackers convinced the victims to manually reload the page in IE mode using a flyout prompt. Once the page was rendered using the vulnerable legacy engine, the threat actors executed a two-stage process outlined in the official advisory.

First, the attackers leveraged the Chakra exploit to achieve remote code execution (RCE), and then they utilized a secondary exploit to escalate privileges outside of the confined browser environment. This allowed them to gain complete device control, enabling them to install persistent malware, move laterally across networks, or steal valuable corporate and personal data.

In response to these critical, active exploits, Microsoft swiftly implemented a major policy change to mitigate future risk. They removed the easy-access buttons for IE mode for all non-commercial users. Going forward, enabling IE mode now requires an explicit, site-by-site process through the browser’s Settings > Default Browser menu. This restriction significantly reduces the surface area for exploitation, balancing the need for legacy support with robust, modern security while maintaining a clear, auditable pathway for genuine business requirements.

Reference:

  • Microsoft Revamps Internet Explorer Mode In Edge Following August Cyber Attacks
Tags: Cyber NewsCyber News 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

JPMorgan To Invest In US Security Firms

JPMorgan To Invest In US Security Firms

October 14, 2025
Extortion Group Leaks Salesforce Data

Apple Bug Bounty Hits 2 Million Payout

October 13, 2025
Extortion Group Leaks Salesforce Data

GXC Team Cybercrime Ring Dismantled

October 13, 2025
Extortion Group Leaks Salesforce Data

Extortion Group Leaks Salesforce Data

October 13, 2025
North Korean Hackers Steal Crypto

Google Launches New AI Bug Bounty

October 10, 2025
North Korean Hackers Steal Crypto

DragonForce LockBit Qilin Dominate Ransomware

October 10, 2025

Latest Alerts

Google And Mandiant Uncover Oracle Hack

Unverified COTS Hardware Risks Satellites

Oracle Issues Urgent E Business Suite Fix

Malicious Npm Packages Used In Phishing

Fake Inflation Refund Text Scam Hits NY

Rust Malware ChaosBot Exploits Discord

Subscribe to our newsletter

    Latest Incidents

    SimonMed Imaging Reports Data Breach

    Unity SpeedTree Site Data Breach

    Multi Country Botnet Hits RDP Services

    North Korean IT Workers Evade Verification

    Harvard Probes Breach Tied To Oracle Flaw

    Qilin Ransomware Hits Beer Giant Asahi

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial