CVE-2026-32202 actively exploited after April 27 advisory fix, exposing NTLMv2 hashes via zero-click SMB authentication.
Incomplete patch for a Windows SmartScreen and Windows Shell security prompts bypass created a new bug enabling zero-click ...
In February, Microsoft closed a Windows Shell vulnerability, but incompletely. Attacks have now been discovered. A patch ...
Microsoft warns that some Windows domain controllers are entering restart loops after installing the April 2026 security ...
In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. These ...
A critical Windows Snipping Tool vulnerability (CVE-2026-33829) allows attackers to steal Net-NTLM hashes through malicious ...
Dashmeet Kaur Ajmani discusses how Windows now isolates key credential material, why legacy authentication assumptions can create risk and what teams should watch for when hardening production ...
Microsoft confirmed a Windows zero-click flaw tied to an incomplete patch is being exploited, putting credentials at risk for ...
Microsoft's partial patching in February 2026 of a zero-day vulnerability abused by Russian state-sponsored threat group ...
Nearly every major product family needs immediate patching, from Windows to Office to Microsoft Edge, SQL Server, and even ...
Microsoft’s Windows Shell flaw CVE-2026-32202 is under attack. See how one shortcut file can expose NTLM credentials and ...
Tom's Hardware on MSN
Microsoft's April patch puts Windows domain controllers into reboot loops
Installing this month's Windows Server security update has knocked some enterprise domain controllers into continuous reboot ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results