A critical vulnerability in Microsoft Edge has been discovered, allowing attackers to access stored passwords, making them prime targets for exploitation. This exposure is particularly concerning given the widespread use of the browser, and the fact that zero-day activity targeting Microsoft is on the rise, with another Ivanti zero-day vulnerability recently disclosed. The breach highlights the need for immediate action to assess exposure and apply patches to prevent further compromise. In related news, a series of high-profile breaches and arrests have taken place, including the Taiwan rail hack and a massive 2.45 billion-request DDoS attack. A Karakurt negotiator has also been jailed, and a North Korean IT worker has been sentenced to prison for scamming activities1. The frequency and severity of these breaches underscore the importance of prompt patching and vulnerability assessment, as patching windows are already closing, so what matters most to practitioners is to assess their exposure immediately to prevent potential attacks.