[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fnUt_AWiXbOoA3Ewncw4Mm-uPvLoHT2Aqq2cI0Hq2lPE":3},{"article":4,"iocs":46},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":11,"published_at":13,"ingested_at":14,"relevance_score":15,"entities":16,"category_id":26,"category":27,"article_tags":30},"50c04eb4-1141-41ce-901f-55a3b5269c08","Another Windows zero day released by Nightmare Eclipse (sort of)\n\nIt turns out Microsoft just str...","another-windows-zero-day-released-by-nightmare-eclipse-sort-of-it-turns-out-micr-6327af","Another Windows zero day released by Nightmare Eclipse (sort of)\n\nIt turns out Microsoft just straight up didn't patch an old CVE from 2020 correctly.\n\nhttps:\u002F\u002Ft.co\u002FsNWBtTo4at","A Windows zero-day vulnerability has been exploited by the Nightmare Eclipse threat actor, stemming from Microsoft's incomplete patching of a CVE originally disclosed in 2020. The flaw remained unresolved despite prior remediation attempts, allowing attackers to leverage the unpatched weakness for active exploitation.","Microsoft failed to properly patch 2020 Windows CVE, allowing Nightmare Eclipse exploitation.",null,"https:\u002F\u002Fx.com\u002Fvxunderground\u002Fstatus\u002F2055556704998138251","2026-05-16T07:51:23+00:00","2026-05-16T08:00:07.754816+00:00",8,[17,20,23],{"name":18,"type":19},"Microsoft","vendor",{"name":21,"type":22},"Windows","product",{"name":24,"type":25},"Nightmare Eclipse","threat_actor","574f766a-fb3f-487c-8d2c-0720ae75471b",{"id":26,"icon":11,"name":28,"slug":29},"Zero-day","zero-day",[31,36,41],{"category":32},{"id":33,"icon":11,"name":34,"slug":35},"6cbdd207-aaa1-4176-9534-e156b125e917","Nation-state","nation-state",{"category":37},{"id":38,"icon":11,"name":39,"slug":40},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":42},{"id":43,"icon":11,"name":44,"slug":45},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]