Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days

Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days

Posted on February 11, 2026 By CWS

Microsoft has rolled out updates addressing 59 security vulnerabilities in its software suite, including six critical zero-day threats that have been actively exploited. Released on Tuesday, these updates are part of Microsoft’s regular security maintenance efforts to enhance user protection.

Detailed Breakdown of Vulnerabilities

Among the vulnerabilities, five are categorized as Critical, 52 as Important, and two as Moderate. Privilege escalation vulnerabilities make up the largest group with 25 instances, followed by 12 remote code execution issues, seven spoofing, six information disclosure, five security feature bypasses, three denial-of-service, and one cross-site scripting vulnerability.

In addition to these updates, Microsoft has also addressed three security vulnerabilities in its Edge browser. This includes a Moderate vulnerability affecting the Edge version on Android that could enable unauthorized network-based spoofing.

Highlighted Zero-Day Vulnerabilities

The six zero-day vulnerabilities identified in this update include CVE-2026-21510 and CVE-2026-21513, both with a CVSS score of 8.8, which allow attackers to bypass security features over a network. CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533 are also significant, each presenting various risks such as privilege escalation and denial of service.

Microsoft’s collaboration with the Google Threat Intelligence Group has been crucial in discovering several of these exploits. While specific exploitation details remain undisclosed, the vulnerabilities’ critical nature has prompted immediate action.

Implications and Future Security Measures

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added these vulnerabilities to its Known Exploited Vulnerabilities catalog, mandating Federal Civilian Executive Branch agencies to implement the fixes by early March 2026. Alongside these patches, Microsoft is updating its Secure Boot certificates to strengthen device security.

Microsoft is also advancing its security posture through initiatives like Windows Baseline Security Mode and User Transparency and Consent. These measures aim to enhance default system protections and ensure users are informed about app interactions with sensitive system components.

Concluding on a proactive note, Microsoft’s updates reflect its ongoing commitment to cybersecurity, ensuring robust defenses against evolving threats. Users are encouraged to apply these updates to safeguard their systems effectively.

The Hacker News Tags:CVE, Cybersecurity, Microsoft, Patch Tuesday, Secure Boot, security updates, software vulnerabilities, User Transparency and Consent, Windows security, zero-day vulnerabilities

Post navigation

Previous Post: Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries
Next Post: Douglas Day: From Engineer to Ethical Hacker

Related Posts

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps The Hacker News
HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks The Hacker News
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks The Hacker News
Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government The Hacker News
DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks The Hacker News
Cellebrite Technology Utilized on Kenyan Activist’s Phone Cellebrite Technology Utilized on Kenyan Activist’s Phone The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark