vulnerabilities

Winsage
March 12, 2026
In March, Microsoft released cumulative security updates for Windows 10 and Windows 11, with support for certain versions continuing until March 2026. The updates include KB5079466 for Windows 11 version 26H1, KB5079473 for versions 24H2 and 25H2, KB5078883 for version 23H2, and KB5078885 for Windows 10 version 22H2. These updates will be distributed via Windows Update, the Microsoft Update Catalog, and WSUS for enterprise environments. This month, Microsoft combined the Servicing Stack Update (SSU) with the Latest Cumulative Update, simplifying the update process. Key enhancements include improvements to Secure Boot, with expanded device target data for new certificates, and security enhancements for Explorer’s search functionality in Windows 11 versions 24H2 and 25H2. A fix for Windows Defender Application Control (WDAC) was also implemented, addressing issues with COM objects under certain policy configurations. The Windows System Image Manager received a new warning dialog for confirming the trustworthiness of catalog files, which is important for enterprise environments. Updates for Windows 10 22H2, despite its end-of-life status, included fixes for secure boot issues and improvements for file version history in the Control Panel. An SSU for Windows 11 (KB5077869) was also released to maintain update stability. Microsoft's updates scheduled for March 2026 will address vulnerabilities in components like the Windows App Installer, SQL Server, and Microsoft Office. The Security Update Guide provides detailed information on specific vulnerabilities and affected components.
Winsage
March 11, 2026
Microsoft Corp. has released security updates addressing at least 77 vulnerabilities across its Windows operating systems and various software applications. Key vulnerabilities include: - CVE-2026-21262: Allows an attacker to elevate privileges on SQL Server 2016 and later, with a CVSS v3 base score of 8.8. - CVE-2026-26127: Affects applications running on .NET, potentially leading to denial of service. - CVE-2026-26113 and CVE-2026-26110: Remote code execution flaws in Microsoft Office exploitable by viewing malicious messages in the Preview Pane. - CVE-2026-24291, CVE-2026-24294, CVE-2026-24289, and CVE-2026-25187: Privilege escalation vulnerabilities rated CVSS 7.8. - CVE-2026-21536: A critical remote code execution bug identified by an AI agent, marking a shift toward AI-driven vulnerability discovery. Additionally, Microsoft previously addressed nine browser vulnerabilities and issued an out-of-band update on March 2 for Windows Server 2022. Adobe has released updates for 80 vulnerabilities across its products, and Mozilla Firefox version 148.0.2 has resolved three high-severity CVEs.
Tech Optimizer
March 11, 2026
XShield is a multi-feature digital security suite operated by Xshield Technologies AG and Xshield USA Inc., governed by Swiss law. It combines six protection categories: antivirus, secure VPN, cyber privacy protection, anti-ransomware, dark web monitoring, and mobile security, supporting unlimited devices across iOS, Android, Windows, and macOS. As of March 2026, XShield offers two pricing plans: a monthly plan at .99 and an annual plan at .99, both including full access to all features and 24/7 customer support. It provides a 30-day money-back guarantee for first-time purchases. XShield lacks independent third-party lab certifications. Contact information includes a phone number (+1 800 358 9107), email (care@xshield.com), and 24/7 live chat support.
Winsage
March 11, 2026
Microsoft has released the Windows 10 KB5078885 extended security update, which addresses vulnerabilities identified during the March 2026 Patch Tuesday. This update resolves two zero-day vulnerabilities and a critical issue preventing certain devices from shutting down properly. Users of Windows 10 Enterprise LTSC or those in the ESU program can install it via Settings under Windows Update. The update upgrades Windows 10 to build 19045.7058 and Windows 10 Enterprise LTSC 2021 to build 19044.7058. The update focuses on security enhancements and bug fixes, addressing a total of 79 vulnerabilities, including two actively exploited ones. Key fixes include: - A new warning dialog in Windows System Image Manager for confirming trusted catalog files. - Enhancements to File History for backing up files with specific Chinese and Private Use Area characters. - Stability improvements for specific GPU configurations. - Additional high-confidence device targeting data for Secure Boot certificates. - Adjustments to Chinese fonts for compliance with GB18030-2022A standards. - A fix for Secure Launch-capable PCs with Virtual Secure Mode unable to shut down or hibernate after a previous security update. - Resolution of an issue affecting folder renaming with desktop.ini files in File Explorer. The update also addresses a known issue preventing Windows 10 devices from shutting down or hibernating when System Guard Secure Launch is enabled. Microsoft is deploying new Secure Boot certificates to replace those expiring in June 2026, which are crucial for validating boot components and preventing security risks. There are currently no known issues associated with this update.
AppWizard
March 11, 2026
Russian hackers are targeting messaging applications used by Dutch officials, including WhatsApp and Signal, as part of a global cyber campaign. They aim to infiltrate conversations of high-ranking officials, military personnel, and civil servants. Hackers are using tactics such as impersonating the Signal Support chatbot to obtain security credentials and exploiting the "linked devices" feature to access messages. The AIVD warns that this could lead to significant privacy and security breaches. Peter Reesink, director of military intelligence, cautions against using these apps for sensitive communications, echoing a Pentagon memo advising against the use of Signal due to threats from Russian hackers.
Search