Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Defender Misidentifies DigiCert Certificates

Microsoft Defender Misidentifies DigiCert Certificates

Posted on May 3, 2026 By CWS

A recent security update from Microsoft Defender led to widespread false positives by mistakenly identifying two DigiCert root certificates as malware. This error, which emerged following a signature update around April 30, 2026, has the potential to disrupt essential SSL/TLS and code-signing processes across various global enterprises.

Details of the Detection Error

The erroneous detection was labeled as Trojan:Win32/Cerdigent.A!dha and impacted registry entries associated with DigiCert Assured ID Root CA and DigiCert Trusted Root G4. These certificates, crucial for online security, are located in the Windows trust store under the registry path HKLMSOFTWAREMicrosoftSystemCertificatesAuthRootCertificates.

On systems affected by this update, Microsoft Defender’s automatic quarantine of these certificates led to their removal from the trust store. Consequently, this posed significant risks, including the inability of systems to validate SSL/TLS connections and verify code-signing for legitimate applications.

Impact on Enterprises and Response

The misidentification issue significantly affected organizations dependent on DigiCert-signed software or secure HTTPS connections. Cybersecurity expert Florian Roth quickly raised awareness about the problem, urging the cybersecurity community to investigate and offering solutions to check for restoration of the certificates.

Roth provided an Advanced Hunting query and a command-line method using certutil to assist administrators in verifying their systems. Meanwhile, Microsoft acknowledged the problem and issued corrective updates, notably version .430, which began restoring the quarantined certificates.

Lessons and Future Outlook

Microsoft’s prompt response involved deploying a silent remediation alongside the corrected signature update to ensure quick resolution. Administrators in environments with strict update policies were advised to manually confirm the presence of the certificates.

This incident underscores the complexities and potential pitfalls of automated threat remediation. While such systems are essential for combating cyber threats, they must be carefully managed to prevent unintended consequences.

The Cerdigent false positive highlights the need for stringent quality control in deploying signature updates, especially for critical components like the root certificate trust store. As cybersecurity threats evolve, maintaining accuracy and reliability in security software remains imperative.

Stay informed with our latest cybersecurity updates by following us on Google News, LinkedIn, and X. Reach out to share your cybersecurity stories with us.

Cyber Security News Tags:automated remediation, certificate validation, code-signing, Cybersecurity, DigiCert, enterprise security, false positives, IT security, malware detection, Microsoft Defender, root certificates, security update, SSL/TLS, system certificates, threat detection

Post navigation

Previous Post: Pentagon Partners with Tech Giants for AI in Defense

Related Posts

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets Cyber Security News
NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord Cyber Security News
Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Cyber Security News
Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News
Fake CleanMyMac Site Targets Users with SHub Stealer Fake CleanMyMac Site Targets Users with SHub Stealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark