system security

Winsage
March 28, 2026
Microsoft has confirmed a major kernel security update for Windows 11, revoking trust in older drivers signed through an outdated cross-certification program. The update will ensure that Windows 11 accepts only software that has passed the Windows Hardware Compatibility Program's testing standards. This change aims to counter piracy attempts, particularly against a hacker known as DenuvOwOA, who bypassed Denuvo's anti-piracy protection by manipulating the embedded hypervisor and loading unsigned or vulnerable drivers. The new security policy will block the execution of such code, making existing hacking methods obsolete. The rollout will begin in compatibility assessment mode for Windows 11 and Windows Server & Hosting, with a hard block activated only if no stability issues are detected. Corporate clients can manually add certificates through the Application Control for business tool, while gamers will find it increasingly difficult to run hacked games relying on a modified hypervisor.
Winsage
March 25, 2026
Microsoft is changing its update management policy for the Windows operating system to give users more control over when and how updates are installed. This shift comes after years of user dissatisfaction with the automatic update model implemented in 2015, which often led to unexpected system restarts and disruptions. The new policy allows users to pause updates indefinitely and choose when to install them, improving predictability and convenience. Additionally, Microsoft plans to enhance transparency by providing detailed notifications about updates before installation. While users generally welcome these changes, experts warn that delaying updates could increase vulnerability to cyber threats. Microsoft is also refining Windows 11 to improve speed and user interface, including updates to the integration of Copilot and restoring taskbar customization options.
Winsage
March 4, 2026
There are no plans to release Windows 12 this year, according to sources familiar with Microsoft's roadmap. The focus is on enhancing Windows 11, addressing user feedback, and improving its reputation. Claims about Windows 12, codenamed Hudson Valley Next, and its features, including a modular CorePC architecture and deep AI integration, have been refuted. CorePC was a project from 2023 that aimed to revive the WCOS vision but is likely scrapped. The codename Hudson Valley is unrelated to Windows 12, and speculations about a redesigned interface and subscription model lack official backing. Zac Bowden from Windows Central suggests that if Windows 12 is released, it won't be before 2027. Windows 11 has recently reached a record high market share as support for Windows 10 ends.
Winsage
February 16, 2026
Microsoft has stopped distributing V3 and V4 printer drivers through Windows Update as of last month, affecting printers up to 12 years old. Support for these drivers will end in January 2026, as they were marked as deprecated in September 2023. Users with printers relying on these drivers may experience functionality issues after support ends. Printer manufacturers are now responsible for providing driver updates via their websites, but existing drivers will remain operational. Microsoft confirmed that vendor-supplied drivers can still be installed using separate packages. Most modern printers do not use V3 and V4 drivers, as they are typically over a decade old. Microsoft aims to enhance system security and streamline the printing process by phasing out outdated drivers. After July 2026, Windows will prioritize built-in printer drivers during installation, and from July 2027, manufacturers will no longer be able to submit driver updates to Windows, although Microsoft will continue to provide critical security updates for existing drivers.
Winsage
February 11, 2026
Microsoft has identified several vulnerabilities affecting its products, particularly within Windows Server and Office suites. The affected products and their corresponding vulnerabilities include: - Windows Server 2025: CVE-2026-21510, CVE-2026-21513, CVE-2026-21519, CVE-2026-21525, CVE-2026-21533; updates under article numbers 5075899 and 5075942. - Windows Server 2022, 23H2: Same vulnerabilities as above; update article number 5075897. - Windows Server 2022: Same vulnerabilities; update article number 5075906. - Windows Server 2019: Same vulnerabilities; update article number 5075904. - Windows Server 2016: Same vulnerabilities; update article number 5075999. - Windows Server 2012 R2: CVE-2026-21510, CVE-2026-21513, CVE-2026-21525, CVE-2026-21533; update article number 5075970. - Windows 11 and Windows 10: Various versions (26H1, 25H2, 24H2, 22H2) affected; update articles range from 5077179 to 5075912. - Microsoft Office LTSC for Mac 2024 and Mac 2021: Affected by CVE-2026-21514; release notes available. - Microsoft Office LTSC 2024 and 2021: CVE-2026-21509 and CVE-2026-21514; release notes provided. - Microsoft 365 Apps for Enterprise: Affected by CVE-2026-21509 and CVE-2026-21514; release notes available.
Winsage
January 27, 2026
Many users have experienced issues with their modems after installing the January 2026 Security Update for Windows 11 (KB5074109), which removed several legacy modem drivers, including agrsm64.sys (x64), agrsm.sys (x86), smserl64.sys (x64), and smserial.sys (x86). This removal has rendered many modems inoperable. Users have reported frustrations, with some restoring functionality by uninstalling the update. Microsoft has stated that the removal of these drivers was necessary to address security vulnerabilities, but this has not alleviated user dissatisfaction. Many users are left with limited options and are advised to uninstall the update and pause future updates while awaiting new drivers from manufacturers.
Winsage
January 20, 2026
Microsoft released the January Patch Tuesday update on January 13, 2026, addressing over 110 security vulnerabilities. The update introduced bugs affecting Windows 11, Windows 10, and Windows Server. The first issue involves authentication failures when connecting to a Cloud PC via Remote Desktop, primarily affecting Windows 11 25H2, Windows 10 22H2 ESU, and Windows Server 2025. The second issue affects systems with Secure Launch enabled, causing unexpected restarts instead of shutting down or entering hibernation mode, specifically impacting Windows 11 23H2. Microsoft has released emergency patches for the affected versions, which include: - Windows 11, versions 25H2 and 24H2 (KB5077744) - Windows 11, version 23H2 (KB5077797) - Windows 10, version 22H2 ESU and Windows 10 Enterprise LTSC 2021 (KB5077796) - Windows Server 2025 (KB5077793) - Windows Server 2022 (KB5077800) - Windows Server 2019 and Enterprise LTSC 2019 (KB5077795)
Winsage
January 13, 2026
Microsoft is enhancing security for Windows 11 24H2 and 25H2 users by automatically replacing expiring Secure Boot certificates on eligible devices. Secure Boot protects against malicious software by ensuring only trusted bootloaders are executed during startup. Many Secure Boot certificates are set to expire starting in June 2026, which could jeopardize secure booting capabilities if not updated. The update includes a mechanism to identify devices eligible for automatic receipt of new Secure Boot certificates. IT administrators are advised to install the new certificates to maintain Secure Boot functionality and prevent loss of security updates. Organizations can also deploy Secure Boot certificates through various methods. IT administrators should inventory their devices, verify Secure Boot status, and apply necessary firmware updates before installing Microsoft's certificate updates.
Search