Defence Capitalisation under the Attack Vector Spotlight
"The list of affected software leaves out mention of Microsoft's IIS Web Server software, which is currently the target of exploits capitalising on a zero-day vulnerability."
John,
When zero-day vulnerability exploits are designedly not malicious, but extremely inventive and novel, would capitalisation be credit wealth transfer and/or currency reward/payment to a proxy remote project team, and be much more regarded as an in-house inward investment program and much better beta plan, rather than the System, by its malicious definition/missed positive categorisation, continuing to do ineffective and destructive battle against what would then be, an imagined attack vector?
The real in-house danger would then be that the any statedly benign remote proxy project could demonstrate, for exemplary damages purposes, a particularly severe and catastrophic attack, which would render them sole beneficiary of a revised Code Driven System and Masters in Absolute Control of the Dumb Operating System.
One imagines that particular Stated Outcome, whenever it can be so easily avoided with an inward investment, is a no-brainer, and for to Delay and Risk the Complete and Utter Loss of Operating System Control and Power to a Remote Third Party Proxy, the Pinnacle of Folly which would only be Tempered by the Knowledge that the Existing Intelligence Quotient Running the System was Demonstrably Catastrophically Insufficient.