Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Security Keys May Require PIN After Recent Windows Updates

Microsoft Security Keys May Require PIN After Recent Windows Updates

Posted on November 26, 2025November 26, 2025 By CWS

Microsoft has confirmed that FIDO2 safety keys on Home windows 11 could now immediate customers to arrange a PIN throughout authentication following particular latest updates, aligning with WebAuthn requirements for enhanced person verification.​

The change started with the September 29, 2025, preview replace KB5065789 for OS Builds 26200.6725 and 26100.6725, rolling out step by step to Home windows 11 units.

Deployment accomplished after the November 11, 2025, safety replace KB5068861 for OS Builds 26200.7171 and 26100.7171, or subsequent patches.​

Replace IDRelease DateOS Builds AffectedKB5065789Sept 29, 202526200.6725, 26100.6725 ​KB5068861Nov 11, 202526200.7171, 26100.7171 ​

This impacts sign-ins the place a Relying Social gathering (RP) or Id Supplier (IDP) requests Person Verification set to “Most well-liked” for keys missing a PIN.​

The requirement enforces WebAuthn specs, the place Person Verification (UV) proves person presence through PIN or biometrics. UV ranges embody Discouraged (no PIN wanted), Most well-liked (prompts setup if succesful), and Required. Beforehand, PIN setup occurred solely throughout registration; updates lengthen this to authentication flows for consistency.​

FIDO2 keys allow passwordless authentication through USB, NFC, or Bluetooth, gaining traction in opposition to phishing and credential theft. The shift surprises customers with unregistered PINs, as platforms should now comply by auto-configuring when “most well-liked” is specified.​

Mitigations

RPs or IDPs can keep away from PIN prompts by setting “userVerification” to “discouraged” in PublicKeyCredentialRequestOptions. Microsoft emphasizes this as deliberate compliance, not a bug. Customers ought to test Settings > Accounts > Signal-in choices > Safety Key to handle PINs after the replace.​

Enterprises counting on FIDO2 for MFA face workflow disruptions if unprepared, particularly in passwordless setups. Safety distributors like Yubico word comparable surprising prompts in prior patches.

Whereas bettering adherence to requirements, the change requires config critiques for seamless adoption. No rollback exists, however “discouraged” UV restores prior conduct.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Keys, Microsoft, PIN, Require, Security, Updates, Windows

Post navigation

Previous Post: INE Expands Cross-Skilling Innovations
Next Post: 10 Best Enterprise Remote Access Software

Related Posts

TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands Cyber Security News
AI-Driven Penetration Testing with 20+ Integrated Tools AI-Driven Penetration Testing with 20+ Integrated Tools Cyber Security News
Coruna Exploit Kit Threatens Thousands of iPhones Coruna Exploit Kit Threatens Thousands of iPhones Cyber Security News
MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction Cyber Security News
Instagram Data Leak Exposes Sensitive Info of 17.5M Accounts Instagram Data Leak Exposes Sensitive Info of 17.5M Accounts Cyber Security News
Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark