Command Prompt

Winsage
March 5, 2026
A critical bug in Windows 11 builds 24H2 and 25H2 is causing users with Ethernet connections to lose internet access after installing updates KB5066835 and KB5065789. Users have reported issues on Microsoft’s Q&A forums, and rolling back the operating system is recommended. Possible fixes include performing a full network reset, flushing DNS and resetting TCP/IP via Command Prompt, editing the registry, and using hardware bypass solutions like USB-to-Ethernet or USB-to-WiFi adapters.
Winsage
March 1, 2026
Cybercriminals are exploiting a legacy feature in Windows File Explorer, specifically the WebDAV protocol, to distribute malware and bypass traditional security measures. Despite Microsoft deprecating native WebDAV support in November 2023, it remains active on many systems. Attackers use WebDAV to deceive victims into executing malicious payloads by sending links that connect File Explorer directly to remote servers, avoiding web browsers and their security warnings. They employ methods such as direct linking, URL shortcut files, and LNK shortcut files to deliver exploits. The primary objective of these campaigns, which surged in late 2024, is to deploy Remote Access Trojans (RATs), with 87% of Active Threat Reports involving multiple RATs like XWorm RAT, Async RAT, and DcRAT. These campaigns predominantly target corporate networks in Europe, with many phishing emails written in German and English. Attackers use short-lived WebDAV servers hosted on Cloudflare Tunnel demo accounts to obscure their infrastructure. Security analysts are advised to monitor unusual network activity from Windows Explorer and educate users to verify addresses in File Explorer.
Winsage
February 26, 2026
Windows Update KB5077241, released in February 2026, is a 4.5GB feature update for the 24H2 and 25H2 versions. It poses significant performance risks for older hardware, particularly laptops and desktops without a Neural Processing Unit (NPU). Users with outdated Nvidia graphics cards, specifically the 900 Series (Maxwell) and 1000 Series (Pascal), report issues such as game stuttering, screen flickering, and system boot failures. The update also contains a flaw that inaccurately displays CPU usage in Task Manager, showing 0% utilization even under load. Many users face installation issues, encountering Error 0x800F0983, requiring them to delete update cache files and run repair tools. The update introduces features like a Taskbar Speed Test, Sysmon Security, improved Sleep/Wake functionality, and WebP wallpaper support, but many remain locked. Users can enable these features using ViVeTool with specific commands. Overall, the update is advised against for those with older Nvidia GPUs due to potential conflicts and performance issues.
Tech Optimizer
February 25, 2026
The "kernel security check failure" error on Windows indicates corruption in critical system memory or internal data structures, triggering a bug check to prevent further damage. It is marked by the Blue Screen of Death (BSOD) displaying the message “KERNELSECURITYCHECK_FAILURE” and stop code 0x139. Causes include outdated or incompatible drivers, corrupted system files, faulty RAM, disk errors, third-party software conflicts, faulty Windows updates, overclocking, and malware threats. Common fixes involve updating Windows and drivers, scanning for corrupted files, using Check Disk (CHKDSK), running Windows Memory Diagnostic, and performing System Restore. If unresolved, a clean installation of Windows may be necessary. Regular updates and avoiding unnecessary software installations can help prevent future occurrences.
Winsage
February 17, 2026
Microsoft's Patch Tuesday update, KB5077181, released on February 10, 2026, has caused significant boot failures for users of Windows 11 versions 24H2 (OS build 26200.7840) and 25H2 (OS build 26100.7840), resulting in endless restart loops. Users are reporting over 15 reboot cycles, preventing access to their desktops. Issues include System Event Notification Service (SENS) errors and DHCP problems affecting internet connectivity. Installation errors with codes 0x800f0983 and 0x800f0991 indicate potential hardware, driver, or servicing stack incompatibilities. The update was intended to address 58 vulnerabilities, including six zero-days, but the boot loop issue has overshadowed these enhancements. CVE IDs and their CVSS scores related to the vulnerabilities addressed include: - CVE-2026-21510: 7.5 - CVE-2026-21519: 7.8 - CVE-2026-21533: 8.8 - CVE-2026-20841: 7.1 As of February 15, 2026, there is no "known issues" entry in Microsoft's release notes despite user reports. Users can uninstall the update through the Control Panel if their systems are accessible, or use the Windows Recovery Environment to execute commands for uninstallation if their systems are unbootable.
Search