Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Microsoft Updates IE Mode In Edge

October 14, 2025
Reading Time: 2 mins read
in News
JPMorgan To Invest In US Security Firms

The Internet Explorer (IE) mode in Microsoft Edge serves a vital role for organizations, allowing them to render older Internet Explorer 11-based websites and applications within the modern Edge browser. This feature is designed to simplify the IT environment, ensuring continued access to essential legacy services while standardizing on a single, modern platform for newer web applications.

The vulnerability came to light in August 2025 when threat actors began actively exploiting it. While Microsoft did not immediately release technical specifics regarding the attackers’ identity or the full extent of the operations, the method of exploitation was confirmed. It relied on a combination of social engineering tactics and the use of unpatched zero-day flaws within Internet Explorer’s legacy Chakra JavaScript engine.

The attack chain was highly sophisticated, starting with tricking users into visiting a spoofed, official-looking website. From there, the attackers convinced the victims to manually reload the page in IE mode using a flyout prompt. Once the page was rendered using the vulnerable legacy engine, the threat actors executed a two-stage process outlined in the official advisory.

First, the attackers leveraged the Chakra exploit to achieve remote code execution (RCE), and then they utilized a secondary exploit to escalate privileges outside of the confined browser environment. This allowed them to gain complete device control, enabling them to install persistent malware, move laterally across networks, or steal valuable corporate and personal data.

In response to these critical, active exploits, Microsoft swiftly implemented a major policy change to mitigate future risk. They removed the easy-access buttons for IE mode for all non-commercial users. Going forward, enabling IE mode now requires an explicit, site-by-site process through the browser’s Settings > Default Browser menu. This restriction significantly reduces the surface area for exploitation, balancing the need for legacy support with robust, modern security while maintaining a clear, auditable pathway for genuine business requirements.

Reference:

  • Microsoft Revamps Internet Explorer Mode In Edge Following August Cyber Attacks
Tags: Cyber NewsCyber News 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Credit Card Fraud Ring Busted

November 5, 2025

Cybercrime Groups Join Forces

November 5, 2025

US Sanctions 10 North Korean Entities

November 5, 2025
Google Search AI Mode Knows Everything

Proton Launches Data Breach Observatory

November 4, 2025
Google Search AI Mode Knows Everything

Google AI Blocks 10B Scam Messages

November 4, 2025
Google Search AI Mode Knows Everything

Google Search AI Mode Knows Everything

November 4, 2025

Latest Alerts

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

CISA Warns Linux Flaw Exploited

China Linked Tick Exploits Lanscope

Nation State Hackers Deploy Airstalk

Subscribe to our newsletter

    Latest Incidents

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    Cybercriminals Exploit Remote Monitoring

    Malibu Boats Australia Hit By Ransomware

    Balancer Suffers 128 Million Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial