system security

Winsage
April 2, 2026
Microsoft will roll out new Secure Boot certificates starting in April 2026, allowing users to access and understand their Secure Boot certificate status through the Windows Security app. This feature will be found under the Device security section in the Secure Boot area. Users with PCs manufactured in 2024 or later will have the necessary certificates, while older models will receive updates via Windows Update. The Windows Security app will use a color-coded system to indicate certificate status: a green check box for up-to-date certificates, a yellow bang for safety recommendations, and a red stop icon for critical issues. Further enhancements, including notifications and in-app guidance, will be introduced in May. Resources for IT administrators are available on Microsoft Support.
Winsage
April 2, 2026
Corporate clients often report to Microsoft that Windows updates disrupt their systems, particularly after Patch Tuesday. A 2026 report from Omnissa indicates that Windows environments experience more application crashes and forced shutdowns than macOS. However, Raymond Chen, a Windows expert, suggests that many systems are already compromised before updates are installed. Engineers at Microsoft frequently find that issues persist even after rolling back updates, and similar failures can occur on machines that haven't received the update yet. The actual triggers for system failures often stem from changes made by IT departments prior to updates, such as new drivers or configuration modifications. These changes may not show immediate issues until a reboot occurs during Patch Tuesday, revealing existing instability. Best practices for IT admins include controlled change management, validating drivers and policies before deployment, using staged rollouts, rebooting after major changes, and maintaining logging and monitoring systems. Microsoft conducts extensive testing of updates to ensure system security and stability, and delaying updates can increase risks.
Winsage
March 28, 2026
Microsoft has confirmed a major kernel security update for Windows 11, revoking trust in older drivers signed through an outdated cross-certification program. The update will ensure that Windows 11 accepts only software that has passed the Windows Hardware Compatibility Program's testing standards. This change aims to counter piracy attempts, particularly against a hacker known as DenuvOwOA, who bypassed Denuvo's anti-piracy protection by manipulating the embedded hypervisor and loading unsigned or vulnerable drivers. The new security policy will block the execution of such code, making existing hacking methods obsolete. The rollout will begin in compatibility assessment mode for Windows 11 and Windows Server & Hosting, with a hard block activated only if no stability issues are detected. Corporate clients can manually add certificates through the Application Control for business tool, while gamers will find it increasingly difficult to run hacked games relying on a modified hypervisor.
Winsage
March 25, 2026
Microsoft is changing its update management policy for the Windows operating system to give users more control over when and how updates are installed. This shift comes after years of user dissatisfaction with the automatic update model implemented in 2015, which often led to unexpected system restarts and disruptions. The new policy allows users to pause updates indefinitely and choose when to install them, improving predictability and convenience. Additionally, Microsoft plans to enhance transparency by providing detailed notifications about updates before installation. While users generally welcome these changes, experts warn that delaying updates could increase vulnerability to cyber threats. Microsoft is also refining Windows 11 to improve speed and user interface, including updates to the integration of Copilot and restoring taskbar customization options.
Winsage
March 4, 2026
There are no plans to release Windows 12 this year, according to sources familiar with Microsoft's roadmap. The focus is on enhancing Windows 11, addressing user feedback, and improving its reputation. Claims about Windows 12, codenamed Hudson Valley Next, and its features, including a modular CorePC architecture and deep AI integration, have been refuted. CorePC was a project from 2023 that aimed to revive the WCOS vision but is likely scrapped. The codename Hudson Valley is unrelated to Windows 12, and speculations about a redesigned interface and subscription model lack official backing. Zac Bowden from Windows Central suggests that if Windows 12 is released, it won't be before 2027. Windows 11 has recently reached a record high market share as support for Windows 10 ends.
Winsage
February 16, 2026
Microsoft has stopped distributing V3 and V4 printer drivers through Windows Update as of last month, affecting printers up to 12 years old. Support for these drivers will end in January 2026, as they were marked as deprecated in September 2023. Users with printers relying on these drivers may experience functionality issues after support ends. Printer manufacturers are now responsible for providing driver updates via their websites, but existing drivers will remain operational. Microsoft confirmed that vendor-supplied drivers can still be installed using separate packages. Most modern printers do not use V3 and V4 drivers, as they are typically over a decade old. Microsoft aims to enhance system security and streamline the printing process by phasing out outdated drivers. After July 2026, Windows will prioritize built-in printer drivers during installation, and from July 2027, manufacturers will no longer be able to submit driver updates to Windows, although Microsoft will continue to provide critical security updates for existing drivers.
Winsage
February 11, 2026
Microsoft has identified several vulnerabilities affecting its products, particularly within Windows Server and Office suites. The affected products and their corresponding vulnerabilities include: - Windows Server 2025: CVE-2026-21510, CVE-2026-21513, CVE-2026-21519, CVE-2026-21525, CVE-2026-21533; updates under article numbers 5075899 and 5075942. - Windows Server 2022, 23H2: Same vulnerabilities as above; update article number 5075897. - Windows Server 2022: Same vulnerabilities; update article number 5075906. - Windows Server 2019: Same vulnerabilities; update article number 5075904. - Windows Server 2016: Same vulnerabilities; update article number 5075999. - Windows Server 2012 R2: CVE-2026-21510, CVE-2026-21513, CVE-2026-21525, CVE-2026-21533; update article number 5075970. - Windows 11 and Windows 10: Various versions (26H1, 25H2, 24H2, 22H2) affected; update articles range from 5077179 to 5075912. - Microsoft Office LTSC for Mac 2024 and Mac 2021: Affected by CVE-2026-21514; release notes available. - Microsoft Office LTSC 2024 and 2021: CVE-2026-21509 and CVE-2026-21514; release notes provided. - Microsoft 365 Apps for Enterprise: Affected by CVE-2026-21509 and CVE-2026-21514; release notes available.
Winsage
January 27, 2026
Many users have experienced issues with their modems after installing the January 2026 Security Update for Windows 11 (KB5074109), which removed several legacy modem drivers, including agrsm64.sys (x64), agrsm.sys (x86), smserl64.sys (x64), and smserial.sys (x86). This removal has rendered many modems inoperable. Users have reported frustrations, with some restoring functionality by uninstalling the update. Microsoft has stated that the removal of these drivers was necessary to address security vulnerabilities, but this has not alleviated user dissatisfaction. Many users are left with limited options and are advised to uninstall the update and pause future updates while awaiting new drivers from manufacturers.
Winsage
January 20, 2026
Microsoft released the January Patch Tuesday update on January 13, 2026, addressing over 110 security vulnerabilities. The update introduced bugs affecting Windows 11, Windows 10, and Windows Server. The first issue involves authentication failures when connecting to a Cloud PC via Remote Desktop, primarily affecting Windows 11 25H2, Windows 10 22H2 ESU, and Windows Server 2025. The second issue affects systems with Secure Launch enabled, causing unexpected restarts instead of shutting down or entering hibernation mode, specifically impacting Windows 11 23H2. Microsoft has released emergency patches for the affected versions, which include: - Windows 11, versions 25H2 and 24H2 (KB5077744) - Windows 11, version 23H2 (KB5077797) - Windows 10, version 22H2 ESU and Windows 10 Enterprise LTSC 2021 (KB5077796) - Windows Server 2025 (KB5077793) - Windows Server 2022 (KB5077800) - Windows Server 2019 and Enterprise LTSC 2019 (KB5077795)
Search