Hackers have released another attack code that exploits a critical vulnerability in Microsoft’s Word software—the third such bug to be disclosed in the past week.The proof-of-concept code was posted Tuesday on the Milw0rm.com website, making it widely available to the hacking community. It exploits a previously unreported bug in Word.Like the other recent Word bugs disclosed this past week, it could possibly be used by attackers to run unauthorized software on a victim’s computer, said David Marcus, security research and communications manager with McAfee’s Avert Labs.Attackers have been using these Word exploits in extremely targeted attacks, where a small number of victims are sent an e-mail with a maliciously encoded Word document attached. The hackers use social engineering techniques to try to trick the victim into opening the dangerous attachment. For example, in a recent Word attack, first reported Sunday, the malicious e-mail “was sent to a very high-profile company, directly to three people at the company,” Marcus said.Microsoft is investigating reports of this latest Word bug, a spokesman for the company’s public relations agency said. Though they are not being widely exploited, the unpatched Word vulnerabilities are causing some enterprises concern.At the Port of Seattle, for example, users are being cautioned and e-mail with Word attachments is getting a little more scrutiny, said Ernie Hayden, chief information security manager with the port. “We’ve done some blocking on our e-mail, and we’ve had dialogue with people with respect to what our expectations are,” he said.Attacks on Microsoft’s Office software have been on the rise for months now, said Marc Maiffret, chief technology officer with security vendor eEye Digital Security. Office vulnerabilities were once released “on a monthly basis,” he said. “Now we’re at the point where it’s almost daily.”Still, publishing attack code ultimately works contrary to the interests of the bad guys, he added. “It’s kind of disruptive, and it creates a panic,” he said. “But all it does is make the industry focus and come up with a resolution.”Related Stories:• No Patch Yet for New Word Zero-Day Flaw • New Attack Targets Microsoft WordBy Robert McMillan, IDG News Service (San Francisco Bureau)Keep checking in at our Security Feed for updated news coverage. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe