{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreihu7ijifzcz6rpwdcng4f7pufij5p7hde2esladoxph5tunaekvse",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mkkmy75yb3p2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreia3b7et5fldsrhnwtn74k3lbfheirxptpjtkrrwvsavfnv4vwtip4"
    },
    "mimeType": "image/jpeg",
    "size": 449243
  },
  "path": "/2026/04/microsoft-confirms-active-exploitation.html",
  "publishedAt": "2026-04-28T05:50:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the wild.\nThe vulnerability in question is CVE-2026-32202 (CVSS score: 4.3), a spoofing vulnerability that could allow an attacker to access sensitive information. It was addressed as part of its Patch Tuesday update for this",
  "title": "Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202"
}