Windows security

Winsage
April 30, 2026
Attackers are exploiting CVE-2026-32202, a zero-click vulnerability in Windows Shell, allowing authentication of victims' systems without user interaction. This vulnerability stems from an incomplete patch for CVE-2026-21510 and has been used by the APT28 group with weaponized LNK files to bypass Windows security. Although Microsoft addressed these vulnerabilities in February 2026, the risk remains as opening a folder with a malicious LNK file can still connect victims' machines to the attacker's server, initiating an NTLM authentication handshake that exposes the victim’s Net-NTLMv2 hash. This affects various versions of Windows 10, 11, and Windows Server. Microsoft released a patch for CVE-2026-32202 on April 14, 2026, but did not label it as actively exploited until more than two weeks later, leaving security teams unaware of its urgency. Organizations are advised to apply the patch and consider blocking outbound SMB traffic to mitigate risks.
AppWizard
April 29, 2026
A group of hackers has declared Denuvo, a digital rights management (DRM) software, as "fully useless" after successfully bypassing its protections, which have been in place since 2014. They achieved this through two main strategies: direct cracking, which removes Denuvo from games, and hypervisor bypass, which deceives Denuvo into functioning normally. These methods have been applied to games like Crimson Desert and Resident Evil Requiem. Recently, a prominent hacker announced the release of hypervisor bypasses for EA Sports games, confirming that all games using Denuvo can now be played for free.
Winsage
April 28, 2026
A new vulnerability in Microsoft Windows, designated as CVE-2026-32202, has been discovered due to an incomplete security patch for a previous flaw (CVE-2026-21510). This new vulnerability allows attackers to execute zero-click attacks by processing specially crafted shortcut files, enabling automatic authentication requests without user interaction. The vulnerabilities are linked to another flaw (CVE-2026-21513) in Microsoft’s MSHTML framework, and cybercriminals, specifically the APT28 group, have exploited these issues in attacks against Ukraine and the European Union. Microsoft has released a fix for the new vulnerability in its April 2026 security updates.
Winsage
April 27, 2026
Microsoft has introduced a policy allowing IT administrators to remove the Microsoft Copilot app from managed enterprise devices. This "Remove Microsoft Copilot App" policy will be available as a Policy CSP and Group Policy after the April 2026 Windows security updates for Windows 11 devices on the 25H2 update, specifically for Enterprise, Professional, and Education editions. The policy will uninstall Copilot under certain conditions: both Microsoft 365 Copilot and Microsoft Copilot must be installed, the user must not have manually installed the app, and the app must not have been launched in the past 28 days. Administrators can enable the policy through the Group Policy Editor or configure it via Microsoft Intune and SCCM after the April 2026 updates. The policy aligns with Microsoft's recent changes in managing Copilot, including the cessation of automatic installations and the cancellation of plans to integrate Copilot into system notifications and other features. The policy was initially available to Windows Insiders in January before becoming generally accessible in April 2026.
Tech Optimizer
April 26, 2026
The message “You’ll need a new app to open this windowsdefender link” indicates issues with the Windows operating system when the Windows Security app fails to launch via the windowsdefender protocol. This can prevent users from accessing the security dashboard, despite Microsoft Defender continuing to operate in the background. Common scenarios leading to this error include clicking on Virus & Threat Protection, trying to open Windows Security from the Start menu, interacting with a Defender notification, or following the uninstallation of third-party antivirus software. Root causes may include corrupted Windows Security app registration, damaged system files, third-party antivirus interference, misconfiguration of the Security Center service, or malware interference. To resolve the issue, users can verify that required services are running, repair system files using SFC and DISM, re-register the Windows Security app, check for third-party antivirus conflicts, and perform a repair installation of Windows. Specific steps include checking the status of the Security Center and Microsoft Defender Antivirus Service, executing repair commands in CMD, re-registering the Windows Security app using PowerShell, uninstalling third-party antivirus software, and performing an in-place upgrade if necessary.
Tech Optimizer
April 24, 2026
Microsoft Defender Antivirus effectively addresses everyday security risks for many Windows 11 users without the need for additional software. It is active by default, integrated into the OS, and continuously updated. Windows 11 includes various security features, such as Microsoft Defender SmartScreen, Smart App Control, and Controlled Folder Access, which protect against unsafe links, untrusted applications, and unauthorized data modifications. Microsoft Defender scans files upon access and monitors system processes for threats, utilizing cloud capabilities to address emerging risks. While many users find Microsoft Defender adequate, experts note it may not meet everyone's needs, particularly in enterprise environments. Reviews have pointed out shortcomings, such as low phishing detection and inadequate ransomware protection, with a protection accuracy rating of 93 percent compared to some paid alternatives that achieved 100 percent.
Tech Optimizer
April 24, 2026
The operating system on devices manages background tasks, with security being a key focus. Microsoft has improved Microsoft Defender, its pre-installed antivirus software, and now recommends it as a viable protection option for users. Microsoft Defender Antivirus is effective against everyday security risks for many Windows 11 users without needing additional software. It is deeply integrated into the operating system, continuously updated, and works alongside other security features to protect against hacking techniques, unsafe links, and untrusted applications. Microsoft Defender SmartScreen alerts users to suspicious content, while Smart App Control and Controlled Folder Access provide additional protections. Microsoft emphasizes the need to enable security features and keep devices updated. While many users find Defender adequate, experts note it has limitations, particularly in phishing detection and ransomware protection, with a protection accuracy rating of 93 percent, which is lower than some paid alternatives. For users handling sensitive tasks, a third-party antivirus solution is recommended for better protection.
Winsage
April 22, 2026
Microsoft is set to expire the Secure Boot authentication certificates that protect Windows PCs from threats upon each restart, with this initiative beginning in April 2023. The update will install new certificates and confirm if user action is necessary, with all devices expected to have the update by the end of April 2026. Users can check their Secure Boot status in Windows Security, where a badge system indicates the status. If the certificates expire, users may be at risk of boot-level malware. Microsoft is enhancing visibility of Secure Boot certificate status to aid user awareness. Users should check their PC by the end of the month to ensure it is updated.
Winsage
April 22, 2026
Microsoft is updating the Secure Boot certificates for Windows PCs, which have been in place since 2011. This update will begin with the April security patch rollout and is expected to be fully deployed across PCs by the end of April 2026. Users can check the status of the Secure Boot update by navigating to Windows Security > Device security > Secure Boot, where a color-coded badge will indicate the current status. The update will install new certificates and confirm if user action is necessary. If the badge is red, immediate attention is required. Microsoft is enhancing the visibility of the Secure Boot certificate status within Windows Security to aid users in verifying the update. The certificates will not expire for several more weeks, so users should check their systems by the end of the month.
Search