Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows 11 New Security Feature Denies Unauthorized Access to System Files

Windows 11 New Security Feature Denies Unauthorized Access to System Files

Posted on February 2, 2026February 2, 2026 By CWS

Microsoft has launched a big safety management within the newest Home windows 11 preview replace designed to limit unauthorized interplay with crucial system recordsdata.

Launched as a part of the January 2026 non-security preview (KB5074105), this enhancement particularly targets the Storage settings menu, a delicate space of the working system that reveals detailed details about drive utilization, non permanent recordsdata, and system-reserved storage.

By implementing a compulsory Consumer Account Management (UAC) immediate, Microsoft goals to stop unprivileged customers and potential risk actors with native entry from modifying or analyzing storage configurations with out express administrative approval.

Hardening System Safety

The first modification on this launch serves as a hardening measure for native system safety. Beforehand, customers with entry to an unlocked Home windows session may navigate to Settings > System > Storage and think about granular particulars concerning how laborious drive house was being utilized.

This entry included the power to work together with non permanent recordsdata and think about the breakdown of put in purposes and system recordsdata.

With the set up of KB5074105, Home windows 11 variations 24H2 and 25H2 now implement an administrative checkpoint at this gateway. When a consumer makes an attempt to entry the Storage settings, the working system triggers a UAC immediate.

If the present consumer doesn’t possess administrative privileges, they have to present legitimate credentials to proceed. This successfully mitigates the chance of “shoulder browsing” or unauthorized information manipulation by people who might have gained bodily entry to a workstation or distant entry to a non-admin session.

This replace applies to the latest iterations of the Home windows 11 platform, particularly model 24H2 and the newer model 25H2.

The rollout is at the moment within the “C-release” section, that means it’s an non-obligatory preview that permits directors to check the modifications earlier than they’re included within the necessary Patch Tuesday safety replace scheduled for February.

The next desk outlines the technical specifics related to this launch:

Past the safety hardening of the Settings menu, KB5074105 introduces updates to the underlying AI framework built-in into Home windows 11. These modifications have an effect on the “Copilot+ PC” experiences, particularly updating the fashions used for native processing.

The replace refreshes the Picture Search, Content material Extraction, Semantic Evaluation, and Settings Mannequin parts to model 1.2601.1268.0. These updates are delivered alongside the core OS enhancements to make sure that native AI workloads stay environment friendly and aligned with the working system’s newest safety protocols.

Directors deploying this replace ought to notice that it features a Servicing Stack Replace (SSU), KB5074104. The SSU is crucial for guaranteeing the system permits for dependable set up of future cumulative updates.

As a result of the SSU and the cumulative replace are mixed right into a single payload, particular removing instructions should be used if a rollback is required.

Directors can’t take away the SSU portion as soon as put in; nevertheless, the cumulative portion might be eliminated utilizing the DISM /Take away-Bundle command if compatibility points come up inside the enterprise setting. Microsoft has acknowledged that they’re at the moment not conscious of any identified points affecting this launch.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Denies, Feature, Files, Security, System, Unauthorized, Windows

Post navigation

Previous Post: 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks
Next Post: Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics

Related Posts

LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly Cyber Security News
Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Cyber Security News
New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework Cyber Security News
Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Cyber Security News
New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads Cyber Security News
Top 10 Best Security Orchestration, Automation, And Response (SOAR) Tools in 2025 Top 10 Best Security Orchestration, Automation, And Response (SOAR) Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark