Microsoft Windows Alert—Angry Hacker Drops 2 New Zero-Day Exploits
✨ AI Summary
🔊 جاري الاستماع
InnovationCybersecurityMicrosoft Windows Alert—Angry Hacker Drops 2 New Zero-Day ExploitsByDavey Winder,Senior Contributor.Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst.Follow AuthorMay 13, 2026, 10:25am EDT--:-- / --:--This voice experience is generated by AI. Learn more.This voice experience is generated by AI. Learn more.Angry hacker drops more Windows 0-Days in ongoing campaign.NurPhoto via Getty ImagesThe day following the Microsoft Patch Tuesday security updates rollout is known in cybersecurity circles as Exploit Wednesday. This month, there is more reason than ever to take that very seriously indeed. While Microsoft didn’t patch any “in the wild” vulnerabilities this time, an angry hacker known by the monikers Chaotic Eclipse and Nightmare Eclipse decided to synchronize the public disclosure of no less than two zero-day exploits with the official release. Here’s what you need to know, and do, about the YellowKey and GreenPlasma exploits.Forbes‘Significant Threat’—Billions Of Gmail Users At Risk From Google Security GaffeBy Davey WinderWhat You Need To Know About The YellowKey And GreenPlasma Microsoft Windows Zero-Day ExploitsHell hath no fury like a security researcher scorned. Well, that appears to be so in the case of a bug bounty hacker known as Chaotic Eclipse, who has a history when it comes to posting Windows zero-days after being unhappy over communications with the Microsoft Security Response Center. Having publicly released exploit code for a zero-day in April, that went by the name of BlueHammer and turned Microsoft Defender’s own update workflow into a credential theft mechanism, they are now at it again. “Microsoft has chosen to make this worse instead of resolving the situation like adults,” Chaotic Eclipse said, “they pulled every childish game possible. My patience is running out you're making everyone else paying for it.” The security researcher o...




