Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Week of April 6 Evening News Ratings: WNT Stays on Top

    April 17, 2026

    “Tokenmaxxing” is making developers less productive than they think

    April 17, 2026

    Gazing Into Sam Altman’s Orb Now Proves You’re Human on Tinder

    April 17, 2026
    Facebook Twitter Instagram
    • Tech
    • Gadgets
    • Spotlight
    • Gaming
    Facebook Twitter Instagram
    iGadgets TechiGadgets Tech
    Subscribe
    • Home
    • Gadgets
    • Insights
    • Apps

      “Tokenmaxxing” is making developers less productive than they think

      April 17, 2026

      Hackers are abusing unpatched Windows security flaws to hack into organizations

      April 17, 2026

      Chef Robotics escaped the robot cooking graveyard and says it’s thriving — here’s why

      April 17, 2026

      Uber will now pick up your returns from your doorstep

      April 17, 2026

      Google’s AI Mode can now help you find products in stock nearby

      April 17, 2026
    • Gear
    • Mobiles
      1. Tech
      2. Gadgets
      3. Insights
      4. View All

      Gazing Into Sam Altman’s Orb Now Proves You’re Human on Tinder

      April 17, 2026

      Best Bluetooth Speakers (2026): JBL, Sonos, Bose, and More

      April 17, 2026

      AI Drafting My Stories? Over My Dead Body

      April 17, 2026

      Republican Mutiny Sinks Trump's Push to Extend Warrantless Surveillance

      April 17, 2026

      March Update May Have Weakened The Haptics For Pixel 6 Users

      April 2, 2022

      Project 'Diamond' Is The Galaxy S23, Not A Rollable Smartphone

      April 2, 2022

      The At A Glance Widget Is More Useful After March Update

      April 2, 2022

      Pre-Order The OnePlus 10 Pro For Just $1 In The US

      April 2, 2022

      Motorola Edge+ Review: It Checks A Lot Of Boxes

      April 2, 2022

      This Smartphone Concept Design Is Different… In A Good Way

      April 2, 2022

      Twitter Just Made Searching Your Direct Messages Better

      April 2, 2022

      That Netflix Price Hike Is Starting To Take Place

      April 2, 2022

      Latest Huawei Mobiles P50 and P50 Pro Feature Kirin Chips

      January 15, 2021

      Samsung Galaxy M62 Benchmarked with Galaxy Note10’s Chipset

      January 15, 2021
      9.1

      Review: T-Mobile Winning 5G Race Around the World

      January 15, 2021
      8.9

      Samsung Galaxy S21 Ultra Review: the New King of Android Phones

      January 15, 2021
    • Computing
    iGadgets TechiGadgets Tech
    Home»Apps»Hackers are abusing unpatched Windows security flaws to hack into organizations
    Apps

    Hackers are abusing unpatched Windows security flaws to hack into organizations

    adminBy adminApril 17, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    a moshed/glitchy version of a Windows logo on a Microsoft Store front
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers have broken into at least one organization using Windows vulnerabilities published online by a disgruntled security researcher over the last two weeks, according to a cybersecurity firm.

    On Friday, cybersecurity company Huntress said in a series of posts on X that its researchers have seen hackers taking advantage of three Windows security flaws, dubbed BlueHammer, UnDefend, and RedSun. 

    It’s unclear who the target of this attack is, and who the hackers are.

    BlueHammer is the only bug among the three vulnerabilities being exploited that Microsoft has patched so far. A fix for BlueHammer was rolled out earlier this week. 

    It appears that the hackers are exploiting the bugs by using exploit code that the security researcher published online. 

    Earlier this month, a researcher who goes by Chaotic Eclipse published on their blog what they said was code to exploit an unpatched vulnerability in Windows. The researcher alluded to some conflict with Microsoft as the motivation behind publishing the code. 

    “I was not bluffing Microsoft and I’m doing it again,” they wrote. “Huge thanks to MSRC leadership for making this possible,” they added, referring to Microsoft’s Security Response Center, the company’s team that investigates cyberattacks and handles reports of vulnerabilities.

    Techcrunch event

    San Francisco, CA
    |
    October 13-15, 2026

    Days later, Chaotic Eclipse published UnDefend, and then earlier this week published RedSun. The researcher published code to exploit all three vulnerabilities on their GitHub page. 

    All three vulnerabilities affect the Microsoft-made antivirus Windows Defender, allowing a hacker to gain high-level or administrator access to an affected Windows computer.

    TechCunch could not reach Chaotic Eclipse for comment.

    In response to a series of specific questions, Microsoft’s communications director Ben Hope said in a statement that the company supports “coordinated vulnerability disclosure, a widely adopted industry practice that helps ensure issues are carefully investigated and addressed before public disclosure, supporting both customer protection and the security research community.”

    This is a case of what the cybersecurity industry calls “full disclosure.” When researchers find a flaw, they can report it to the affected software maker to help them fix it. At that point, usually the company acknowledges receipt, and if the vulnerability is legitimate, the company works to patch it. Often, the company and researchers agree on a timeline that establishes when the researcher can publicly explain their findings. 

    Sometimes, for a variety of reasons, that communication breaks down and researchers publicly disclose details of the bug. In some cases, in part to prove the existence or severity of a flaw, researchers go a step further and publish “proof-of concept” code capable of abusing that bug.

    When that happens, cybercriminals, government hackers, and others can then take the code and use it for their attacks, which prompts cybersecurity defenders to rush to deal with the fallout. 

    “With these being so easily available now, and already weaponized for easy use, for better or for worse I think that ultimately puts us in another tug-of-war match between defenders and cybercriminals,” John Hammond, one of the researchers at Huntress who has been tracking the case, told TechCrunch. 

    “Scenarios like these cause us to race with our adversaries; defenders frantically try to protect against ill-intended actors who rapidly take advantage of these exploits… especially now as it is just ready-made attacker tooling,” said Hammond.

    Security,bugs,cybersecurity,infosec,Microsoft,Vulnerabilities,Windows,Zero-daysbugs,cybersecurity,infosec,Microsoft,Vulnerabilities,Windows,Zero-days#Hackers #abusing #unpatched #Windows #security #flaws #hack #organizations1776448118

    abusing bugs cybersecurity flaws hack hackers infosec Microsoft organizations Security unpatched vulnerabilities Windows Zero-days
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    admin
    • Website
    • Tumblr

    Related Posts

    “Tokenmaxxing” is making developers less productive than they think

    April 17, 2026

    Chef Robotics escaped the robot cooking graveyard and says it’s thriving — here’s why

    April 17, 2026

    Uber will now pick up your returns from your doorstep

    April 17, 2026
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    January 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    January 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    January 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By admin
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By admin
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By admin
    Advertisement
    Demo
    iGadgets Tech
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Tech
    • Gadgets
    • Mobiles
    • Our Authors
    © 2026 ThemeSphere. Designed by WPfastworld.

    Type above and press Enter to search. Press Esc to cancel.