Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days

Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days

Posted on February 11, 2026 By CWS

Microsoft has rolled out updates addressing 59 security vulnerabilities in its software suite, including six critical zero-day threats that have been actively exploited. Released on Tuesday, these updates are part of Microsoft’s regular security maintenance efforts to enhance user protection.

Detailed Breakdown of Vulnerabilities

Among the vulnerabilities, five are categorized as Critical, 52 as Important, and two as Moderate. Privilege escalation vulnerabilities make up the largest group with 25 instances, followed by 12 remote code execution issues, seven spoofing, six information disclosure, five security feature bypasses, three denial-of-service, and one cross-site scripting vulnerability.

In addition to these updates, Microsoft has also addressed three security vulnerabilities in its Edge browser. This includes a Moderate vulnerability affecting the Edge version on Android that could enable unauthorized network-based spoofing.

Highlighted Zero-Day Vulnerabilities

The six zero-day vulnerabilities identified in this update include CVE-2026-21510 and CVE-2026-21513, both with a CVSS score of 8.8, which allow attackers to bypass security features over a network. CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533 are also significant, each presenting various risks such as privilege escalation and denial of service.

Microsoft’s collaboration with the Google Threat Intelligence Group has been crucial in discovering several of these exploits. While specific exploitation details remain undisclosed, the vulnerabilities’ critical nature has prompted immediate action.

Implications and Future Security Measures

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added these vulnerabilities to its Known Exploited Vulnerabilities catalog, mandating Federal Civilian Executive Branch agencies to implement the fixes by early March 2026. Alongside these patches, Microsoft is updating its Secure Boot certificates to strengthen device security.

Microsoft is also advancing its security posture through initiatives like Windows Baseline Security Mode and User Transparency and Consent. These measures aim to enhance default system protections and ensure users are informed about app interactions with sensitive system components.

Concluding on a proactive note, Microsoft’s updates reflect its ongoing commitment to cybersecurity, ensuring robust defenses against evolving threats. Users are encouraged to apply these updates to safeguard their systems effectively.

The Hacker News Tags:CVE, Cybersecurity, Microsoft, Patch Tuesday, Secure Boot, security updates, software vulnerabilities, User Transparency and Consent, Windows security, zero-day vulnerabilities

Post navigation

Previous Post: Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries
Next Post: Douglas Day: From Engineer to Ethical Hacker

Related Posts

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The Hacker News
Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat The Hacker News
AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities The Hacker News
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers The Hacker News
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns The Hacker News
Feds Seize .4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark