Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows 11 Update to Block Untrusted Kernel Drivers

Windows 11 Update to Block Untrusted Kernel Drivers

Posted on March 28, 2026 By CWS

Microsoft is set to enhance the security of its Windows operating systems by blocking untrusted kernel drivers. This initiative, starting with the April 2026 update, will apply to Windows 11 and Windows Server 2025, effectively preventing these drivers from loading unless they are certified through the Windows Hardware Compatibility Program. This move is designed to minimize security risks by reducing the potential attack surface for malicious entities.

Addressing Legacy Security Vulnerabilities

The cross-signed root program, initially introduced in the early 2000s, allowed third-party certificate authorities to issue Windows-trusted code-signing certificates. However, this system lacked the necessary assurances for kernel code security and compatibility. As developers controlled their own private keys, it became a target for credential theft, which enabled attackers to deploy rootkits.

In 2021, Microsoft deprecated this signing program, and its associated certificates have since expired. Despite this, Windows continued to trust these outdated certificates to ensure legacy hardware compatibility, presenting a security risk that the new update aims to eliminate.

Implementation of New Security Measures

Under the new policy, drivers will be blocked on systems by default, with notifications displayed to users. Microsoft aims to sever the remaining trust from the old program by requiring vendors to pass stringent identity verification, submit comprehensive test results, and undergo malware scanning to obtain a Microsoft-owned certificate.

To avoid system disruptions, Microsoft is implementing an explicit allow list for widely used, highly reputable cross-signed drivers. The update will also introduce an evaluation mode, where the Windows kernel will audit driver load signals to prevent interruptions to critical functions. Enforcement will only occur after meeting specific runtime and restart thresholds.

Options for Enterprise Environments

For organizations using internally developed custom kernel drivers, Microsoft offers alternative solutions. Enterprises can bypass the default block by utilizing an Application Control for Business policy. This approach involves signing the policy with an authority rooted in the device’s UEFI Secure Boot variables, allowing administrators to explicitly trust private signers.

This method ensures that threat actors cannot load malicious drivers arbitrarily, while legitimate internal operations remain unaffected. As a result, enterprises can maintain their security posture without compromising operational efficiency.

Stay updated with the latest developments in cybersecurity by following us on Google News, LinkedIn, and X. Contact us to share your stories and insights.

Cyber Security News Tags:application control, cross-signed drivers, Cybersecurity, driver certification, driver security, enterprise solutions, hardware compatibility, kernel drivers, legacy hardware, malware protection, Microsoft update, system security, UEFI Secure Boot, Windows 11, Windows Server 2025

Post navigation

Previous Post: Apple Warns Old iPhone Users of Web Attacks
Next Post: Cyberattack Hits European Commission’s AWS Account

Related Posts

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code 10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript Cyber Security News
New Banking Malware Abusing WhatsApp to Gain Complete Remote Access to Your Computer New Banking Malware Abusing WhatsApp to Gain Complete Remote Access to Your Computer Cyber Security News
New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads Cyber Security News
10 Best Enterprise Remote Access Software 10 Best Enterprise Remote Access Software Cyber Security News
Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical SQL Injection Flaw Patched in SAP S/4HANA
  • Stealthy Vidar Stealer Campaign Evades EDR, Steals Data
  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical SQL Injection Flaw Patched in SAP S/4HANA
  • Stealthy Vidar Stealer Campaign Evades EDR, Steals Data
  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark