Credit: Microsoft With Microsoft developers scrambling to patch a security hole in Excel, a hacker has now posted code that exploits a second vulnerability in the spreadsheet software.Microsoft says that criminals are not yet using this code in attacks, but the software could be used to run unauthorized programs on a PC, according to Marc Maiffret, chief hacking officer at security software vendor eEye Digital Security.This latest Excel attack was disclosed Monday in a posting to the Full Disclosure security discussion list.It marks the second time in the past week that Excel users have had to worry about this type of malware. On Monday, Microsoft published an alert warning of a similarly critical attack, which was first discovered late last week. Both attacks rely on users to open maliciously encoded Excel documents, but this new attack is less critical than the first. That’s because users must take the additional step of clicking on a specially crafted hyperlink for the attack to work. On Excel 2003, even more work is required, as users must also dismiss a warning pop-up window before the malicious code can run.“You’d really have to go out of your way in Excel 2003 to shoot yourself in the foot,” Maiffret said. Microsoft has published suggested workarounds for the first attack, but the company had little to say on this latest vulnerability.“Microsoft is investigating reports of the posting,” a spokeswoman for the company’s public relations agency said Tuesday in an e-mail.With Microsoft gradually shoring up the holes in its operating system and browser software, hackers have been looking for new areas in which to poke and prod for security vulnerabilities. Office is proving to be one such spot. Just last week, Microsoft patched a similarly critical hole in its Word software, and Office and Outlook Express are now listed among the top sources of Internet security holes, as rated by the SANS Institute.— Robert McMillian, IDG News Service (San Francisco Bureau)Related Link: Microsoft Offers Guidance on Excel BugThis article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in.Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe