In partnership with

πŸ‘‹ Welcome to Unlocked

Microsoft just dropped the second-largest Patch Tuesday in history: 163 CVEs patched in a single release, including two zero-days β€” one actively exploited in the wild against SharePoint right now.

But the bigger story isn't this month's patch count. It's what's driving it. AI-assisted bug discovery has fundamentally broken the economics of vulnerability management β€” and defenders are losing ground fast.

Here's what you need to know.

πŸ”‘ Patch This Today: CVE-2026-32201 (SharePoint Zero-Day)

The actively exploited vulnerability in this release is a spoofing flaw in Microsoft SharePoint Server β€” and it's nastier than its CVSS score of 6.5 suggests.

Why it matters:

  • No credentials required. An unauthenticated attacker can exploit this over a network β€” no login barrier

  • Dual impact: Attackers can both read sensitive data and modify it β€” a rare one-two combination

  • Already being used in attacks. Microsoft confirmed active exploitation but hasn't attributed it yet

Affected: SharePoint Server 2016, 2019, and Subscription Edition. Patch these first.

A second zero-day, CVE-2026-33825 in Microsoft Defender, was publicly disclosed before Microsoft had a patch ready β€” proof-of-concept exploit code ("BlueHammer") dropped to GitHub on April 3rd. If you haven't already, read our explainer on how zero-day vulnerabilities work and why timing is everything.

πŸ“‰ The Numbers Tell the Story

This month: 163 CVEs. 8 Critical. 154 Important. EoP vulnerabilities make up over 57% of all patches.

Zoom out and the trend is alarming:

  • January 2026: 112 CVEs, 3 actively exploited zero-days

  • February 2026: 59 CVEs, 6 actively exploited zero-days

  • March 2026: 84 CVEs

  • April 2026: 163 CVEs, 2 zero-days

That's 9 actively exploited zero-days in Q1 alone. The pipeline isn't clearing β€” it's accelerating. And AI is why.

πŸ€– The AI Vulnerability Tsunami

Earlier this year, Trend Micro's Zero Day Initiative unveiled Γ†SIR β€” an AI system that autonomously surfaces potential vulnerabilities for human researchers to verify. The model: AI generates leads, humans make calls. The result: faster, higher-volume discovery than any traditional research team could produce.

The rest of the industry followed. In 2025, more than 48,000 CVEs were published β€” a 38% increase from 2023. 2026 is on pace to shatter that record.

Both defenders and attackers are using these tools. The disclosure pipeline β€” built for a world where humans were the bottleneck β€” was never designed to handle this volume. The result is what security teams are calling "triage debt": a compounding backlog of disclosed vulnerabilities that vendors must patch and defenders must prioritize, with no sign of slowing down.

πŸ” Two Other Patches Worth Flagging

CVE-2026-33826 β€” Active Directory RCE (CVSS 8.0, Critical) Remote Code Execution in Active Directory, rated "Exploitation More Likely." Requires being in the same AD domain, but AD is the most common lateral movement target in enterprise breaches. State-sponsored groups like Salt Typhoon have made AD exploitation a core tactic β€” don't sleep on this one.

CVE-2026-33824 β€” Windows IKE RCE (CVSS 9.8, Critical) Unauthenticated, no user interaction required, exploitable by sending crafted packets. Microsoft published mitigations for environments that can't patch immediately β€” apply them now.

πŸ’‘ The Unlocked Insight: Agentic Triage Is No Longer Optional

Here's the hard truth: the old patch management playbook is broken.

When AI tools are finding vulnerabilities at industrial scale, CVSS-based triage creates a dangerous illusion of control. CVE-2026-32201 scores a "medium" 6.5 on paper β€” but it's being exploited in the wild today. Meanwhile, a theoretical 9.8 in an obscure component sits in a patching queue because it looked more urgent on a spreadsheet.

The organizations that will stay ahead are moving to Agentic Triage: AI-driven patch prioritization built around real-world exploitability, not theoretical scores. Three shifts that matter right now:

  1. CISA's KEV catalog over CVSS. If a CVE is on the Known Exploited Vulnerabilities list, it's been confirmed in the wild. That signal beats any calculated severity score.

  2. Automate assessment, not just deployment. AI should continuously rank which vulnerabilities in your specific environment matter most β€” based on your assets, exposure, and live threat actor behavior.

  3. Zero-days are the new normal. Nine actively exploited in Q1 alone. Build them into your standing playbook, not just your incident response. Our deep dive on IAM solutions covers how leading platforms are starting to integrate real-time vulnerability prioritization into identity workflows.

In a world where AI finds 160+ bugs a month, manual patching prioritization is dead. The only question is how fast your organization gets ahead of it.

πŸ’‘ Unlocked Tip of the Week

Ask your security team this week: "If a CVE scores 6.5 but is on CISA's KEV list, does our process treat it as higher priority than a theoretical 9.8 that isn't actively exploited?"

If the answer is no β€” or if nobody knows β€” your triage model is built on the wrong foundation. CVE-2026-32201 is the perfect case study. Start there.

πŸ“Š Poll of the Week

πŸ”₯ Final Takeaway

163 CVEs. One actively exploited zero-day. Nine zero-days in Q1 alone.

This isn't a bad month β€” it's the new baseline. AI has changed the economics of vulnerability research permanently, and the patching model that got organizations through the last decade won't get them through the next one.

Patch CVE-2026-32201 today. Then use it as the forcing function to rethink how you triage everything else.

Stay ready. Stay resilient.

Until next time,

πŸ™‹ Author Spotlight

Meet Alex Rivera β€” Security Platform Engineer

Alex is a Security Platform Engineer at Everykey with a deep focus on identity architecture and the technical nuances of modern authentication. Alex is passionate about building infrastructure that balances robust security with seamless user experiences. His work explores the "Authentication Paradox"β€”the idea that as security measures get stronger, they can sometimes create new, invisible vulnerabilities if not implemented with a platform-wide perspective. Alex focuses on making sure the systems we trust are actually worth trusting.

Our Sponsor

The Gold Standard for AI News

AI keeps coming up at work, but you still don't get it?

That's exactly why 1M+ professionals working at Google, Meta, and OpenAI read Superhuman AI daily.

Here's what you get:

  • Daily AI news that matters for your career - Filtered from 1000s of sources so you know what affects your industry.

  • Step-by-step tutorials you can use immediately - Real prompts and workflows that solve actual business problems.

  • New AI tools tested and reviewed - We try everything to deliver tools that drive real results.

  • All in just 3 minutes a day



Keep Reading