Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows 11 Update to Block Untrusted Kernel Drivers

Windows 11 Update to Block Untrusted Kernel Drivers

Posted on March 28, 2026 By CWS

Microsoft is set to enhance the security of its Windows operating systems by blocking untrusted kernel drivers. This initiative, starting with the April 2026 update, will apply to Windows 11 and Windows Server 2025, effectively preventing these drivers from loading unless they are certified through the Windows Hardware Compatibility Program. This move is designed to minimize security risks by reducing the potential attack surface for malicious entities.

Addressing Legacy Security Vulnerabilities

The cross-signed root program, initially introduced in the early 2000s, allowed third-party certificate authorities to issue Windows-trusted code-signing certificates. However, this system lacked the necessary assurances for kernel code security and compatibility. As developers controlled their own private keys, it became a target for credential theft, which enabled attackers to deploy rootkits.

In 2021, Microsoft deprecated this signing program, and its associated certificates have since expired. Despite this, Windows continued to trust these outdated certificates to ensure legacy hardware compatibility, presenting a security risk that the new update aims to eliminate.

Implementation of New Security Measures

Under the new policy, drivers will be blocked on systems by default, with notifications displayed to users. Microsoft aims to sever the remaining trust from the old program by requiring vendors to pass stringent identity verification, submit comprehensive test results, and undergo malware scanning to obtain a Microsoft-owned certificate.

To avoid system disruptions, Microsoft is implementing an explicit allow list for widely used, highly reputable cross-signed drivers. The update will also introduce an evaluation mode, where the Windows kernel will audit driver load signals to prevent interruptions to critical functions. Enforcement will only occur after meeting specific runtime and restart thresholds.

Options for Enterprise Environments

For organizations using internally developed custom kernel drivers, Microsoft offers alternative solutions. Enterprises can bypass the default block by utilizing an Application Control for Business policy. This approach involves signing the policy with an authority rooted in the device’s UEFI Secure Boot variables, allowing administrators to explicitly trust private signers.

This method ensures that threat actors cannot load malicious drivers arbitrarily, while legitimate internal operations remain unaffected. As a result, enterprises can maintain their security posture without compromising operational efficiency.

Stay updated with the latest developments in cybersecurity by following us on Google News, LinkedIn, and X. Contact us to share your stories and insights.

Cyber Security News Tags:application control, cross-signed drivers, Cybersecurity, driver certification, driver security, enterprise solutions, hardware compatibility, kernel drivers, legacy hardware, malware protection, Microsoft update, system security, UEFI Secure Boot, Windows 11, Windows Server 2025

Post navigation

Previous Post: Apple Warns Old iPhone Users of Web Attacks
Next Post: Cyberattack Hits European Commission’s AWS Account

Related Posts

CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems Cyber Security News
Apache ActiveMQ Flaw Enables DoS Attacks with Malformed Packets Apache ActiveMQ Flaw Enables DoS Attacks with Malformed Packets Cyber Security News
LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One Cyber Security News
Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer Cyber Security News
Microsoft Defender Boosts Threat Response with New Script Library Microsoft Defender Boosts Threat Response with New Script Library Cyber Security News
Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark