The first platform update for Microsoft Edge, released by the tech giant last week, brings several improvements to the web browser’s rendering engine, including a security feature designed to block unauthorized code injection attempts.
When it announced Edge security improvements in May, Microsoft said it had decided to remove support for legacy technologies and features, including ActiveX, toolbars, VB Script and Browser Helper Objects (BHO), arguing that the rich capabilities of HTML5 significantly reduce the need for such extensions.
The company has improved Edge security even further with the introduction of EdgeHTML 13, the latest version of the web browser’s rendering engine.
While removing support for ActiveX and BHO improves security, toolbars and other unwanted or malicious third-party components can still be installed by injecting dynamic-link libraries (DLLs) into the Edge process.
In an effort to prevent these types of attacks and make browser exploits more difficult to carry out, the latest Edge update blocks DLL injections into the browser process. Only components that are signed by Microsoft and WHQL-signed device drivers will be allowed to load, Microsoft said.
“Code integrity enforcement can be done in the process, or in the kernel. Enforcement in the process is only useful if the threat model is that the process is not yet compromised, because if it has been compromised, then the hacked process can just disable the code integrity check for itself,” explained Crispin Cowan, senior program manager at Microsoft Edge. “Microsoft Edge uses enforcement in the kernel, which is robust against a compromised process, so that even a pernicious ad injector cannot turn off the code integrity check. With the browser process model and the Windows kernel helping each other in this way, Microsoft Edge becomes the first and only PC browser with library content integrity protection.”
Microsoft says there is no such thing as a silver bullet when it comes to browser security, but the company believes the latest improvements will significantly increase the sophistication and expense needed to attack Edge users.
Windows Insider Preview users have benefited from these changes for the past few months and Microsoft says it has seen “tremendous results.”
Earlier this week, at the Microsoft Government Cloud Forum in Washington, D.C., Microsoft CEO Satya Nadella said the company invests more than $1 billion in security research and development every year.
Related Reading: Dyre Banking Trojan Now Targets Windows 10, Microsoft Edge

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
