CVE-2026-32202 actively exploited after April 27 advisory fix, exposing NTLMv2 hashes via zero-click SMB authentication.
Incomplete patch for a Windows SmartScreen and Windows Shell security prompts bypass created a new bug enabling zero-click ...
Microsoft confirmed a Windows zero-click flaw tied to an incomplete patch is being exploited, putting credentials at risk for ...
In February, Microsoft closed a Windows Shell vulnerability, but incompletely. Attacks have now been discovered. A patch ...
Microsoft's partial patching in February 2026 of a zero-day vulnerability abused by Russian state-sponsored threat group ...
Microsoft’s Windows Shell flaw CVE-2026-32202 is under attack. See how one shortcut file can expose NTLM credentials and ...
Spread the loveIntroduction The cybersecurity landscape is in a constant state of evolution, with vulnerabilities emerging and being exploited at an alarming rate. One of the most pressing threats ...
AiTM attacks don't steal passwords; they copy the result of a real login. You need to watch what happens after the user logs ...
Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—blocking phishing relays and MFA bypass.
The US cybersecurity agency CISA warns of observed attacks on the Windows Shell and ConnectWise ScreenConnect.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results