Automatically translated.View original post

This time, fix the antique bug yet? ðŸšĻ

Microsoft released a security update (Patch Tuesday) for February 2026, fixing a total of 58 vulnerabilities covering Windows 11, KB5077181, KB5075941, and Windows 10 per ESU. KB5075912 has six zero-day vulnerabilities that have actually been compromised and three have been made public.

.

There are five Critical Vulnerabilities, three Elevation of Privilege and two Information Disclosure.

.

A breakdown of the vulnerabilities that have been addressed is as follows:

- Elevation of Privilege vulnerability: 25 items

- Security Feature Bypass vulnerability: 5 items

- Remote Code Execution: 12 items

- Information Disclosure: 6 items

- Denial of Service vulnerability: 3 items

- Identity forgery vulnerability (Spoofing): 7 items

- A total of 58 items.

.

The figure does not include three Microsoft Edge vulnerabilities that were previously patched in the same month.

.

Microsoft also began gradually releasing a new set of Secure Boot certificates, as a replacement for the original 2011 certificates that expire in June 2026, to be implemented gradually based on device availability, to prevent impact on system boot.

.

Other software manufacturers issuing security updates in February 2026 include Adobe, BeyondTrust, Cisco, Fortinet, Google (Android), n8n and SAP, with some fixing serious-level vulnerabilities as well.

.

Administrators and users are advised to perform Windows and Microsoft Office updates ASAP, specifically Zero-Day-related patches and permissions vulnerability, to protect against current attacks.

.

Source: bleepingcomputer

# IT # IT News # Includes IT matters # Cough to know

2/16 Edited to

... Read moreāđƒāļ™āļāļēāļ™āļ°āļœāļđāđ‰āļ”āļđāđāļĨāļĢāļ°āļšāļšāđ„āļ­āļ—āļĩāļ—āļĩāđˆāļ•āđ‰āļ­āļ‡āļĢāļąāļšāļœāļīāļ”āļŠāļ­āļšāļ”āļđāđāļĨāļ­āļąāļ›āđ€āļ”āļ•āļĢāļ°āļšāļš Windows āļ—āļļāļāđ€āļ”āļ·āļ­āļ™ āļœāļĄāđ„āļ”āđ‰āļĄāļĩāđ‚āļ­āļāļēāļŠāļ—āļ”āļŠāļ­āļšāļ­āļąāļ›āđ€āļ”āļ• Patch Tuesday āļĨāđˆāļēāļŠāļļāļ”āļ‚āļ­āļ‡ Microsoft āļ›āļĢāļ°āļˆāļģāđ€āļ”āļ·āļ­āļ™āļāļļāļĄāļ āļēāļžāļąāļ™āļ˜āđŒ 2026 āļ‹āļķāđˆāļ‡āļ„āļĢāļēāļ§āļ™āļĩāđ‰ Microsoft āđāļāđ‰āđ„āļ‚āļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ–āļķāļ‡ 58 āļĢāļēāļĒāļāļēāļĢ āļĢāļ§āļĄāļ–āļķāļ‡āļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆāđāļšāļš Zero-Day āļ—āļĩāđˆāļĄāļĩāļĢāļēāļĒāļ‡āļēāļ™āļ–āļđāļāđƒāļŠāđ‰āļ‡āļēāļ™āļˆāļĢāļīāļ‡āđāļĨāđ‰āļ§āļ–āļķāļ‡ 6 āļĢāļēāļĒāļāļēāļĢ āđ€āļŦāđ‡āļ™āđ„āļ”āđ‰āļŠāļąāļ”āļ§āđˆāļēāļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāđ„āļ‹āđ€āļšāļ­āļĢāđŒāļĒāļąāļ‡āļ„āļ‡āđ€āļžāļīāđˆāļĄāļ„āļ§āļēāļĄāļ‹āļąāļšāļ‹āđ‰āļ­āļ™āđāļĨāļ°āļĢāļļāļ™āđāļĢāļ‡āļ‚āļķāđ‰āļ™āđ€āļĢāļ·āđˆāļ­āļĒāđ† āđ‚āļ”āļĒāđƒāļ™āđāļžāļ•āļŠāđŒāļ„āļĢāļąāđ‰āļ‡āļ™āļĩāđ‰āļĄāļĩāļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆāļĢāđ‰āļēāļĒāđāļĢāļ‡āļĢāļ°āļ”āļąāļš Critical āļ„āļĢāļ­āļšāļ„āļĨāļļāļĄāļŦāļĨāļēāļĒāļĢāļđāļ›āđāļšāļš āļ—āļąāđ‰āļ‡āļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆāļĒāļāļĢāļ°āļ”āļąāļšāļŠāļīāļ—āļ˜āļīāđŒāđ€āļ›āļīāļ”āļ—āļēāļ‡āđƒāļŦāđ‰āđāļŪāļāđ€āļāļ­āļĢāđŒāļŠāļēāļĄāļēāļĢāļ–āđ€āļžāļīāđˆāļĄāļŠāļīāļ—āļ˜āļīāđŒāļ•āļąāļ§āđ€āļ­āļ‡āļ āļēāļĒāđƒāļ™āļĢāļ°āļšāļš āđāļĨāļ°āļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆāđ€āļ›āļīāļ”āđ€āļœāļĒāļ‚āđ‰āļ­āļĄāļđāļĨāļ—āļĩāđˆāļ­āļēāļˆāļ—āļģāđƒāļŦāđ‰āļ‚āđ‰āļ­āļĄāļđāļĨāļŠāļģāļ„āļąāļāļŦāļĨāļļāļ”āļ­āļ­āļāļŠāļđāđˆāļŠāļēāļ˜āļēāļĢāļ“āļ° āļ™āļ­āļāļˆāļēāļāļ™āļĩāđ‰ Microsoft āļĒāļąāļ‡āđ€āļ›āļīāļ”āļ•āļąāļ§ Secure Boot certificates āļŠāļļāļ”āđƒāļŦāļĄāđˆ āđ€āļžāļ·āđˆāļ­āļ—āļ”āđāļ—āļ™āđƒāļšāļĢāļąāļšāļĢāļ­āļ‡āđ€āļāđˆāļēāļ—āļĩāđˆāļˆāļ°āļŦāļĄāļ”āļ­āļēāļĒāļļāđƒāļ™āļ›āļĩ 2026 āđ€āļžāļ·āđˆāļ­āļĒāļāļĢāļ°āļ”āļąāļšāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āļ‚āļąāđ‰āļ™āļ•āļ­āļ™āļšāļđāļ•āđ€āļ„āļĢāļ·āđˆāļ­āļ‡ āđāļ–āļĄāļĒāļąāļ‡āļĨāļ”āđ‚āļ­āļāļēāļŠāļ—āļĩāđˆāļĢāļ°āļšāļšāļˆāļ°āļšāļđāļ•āđ„āļĄāđˆāļ‚āļķāđ‰āļ™āļŦāļĨāļąāļ‡āļ­āļąāļ›āđ€āļ”āļ•āļ”āđ‰āļ§āļĒ āļˆāļēāļāļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒāļ•āļĢāļ‡ āļœāļĄāđāļ™āļ°āļ™āļģāļ­āļĒāđˆāļēāļ‡āļĒāļīāđˆāļ‡āđƒāļŦāđ‰āļœāļđāđ‰āļ”āļđāđāļĨāļĢāļ°āļšāļšāđƒāļ™āļ­āļ‡āļ„āđŒāļāļĢāļĢāļĩāļšāļ§āļēāļ‡āđāļœāļ™āđ€āļˆāļēāļ°āļˆāļ‡āļ•āļĢāļ§āļˆāļŠāļ­āļšāđāļĨāļ°āļ™āļģāđāļžāļ•āļŠāđŒāļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ™āļĩāđ‰āđ„āļ›āļ•āļīāļ”āļ•āļąāđ‰āļ‡āļ­āļĒāđˆāļēāļ‡āļĢāļ§āļ”āđ€āļĢāđ‡āļ§ āđ‚āļ”āļĒāđ€āļ‰āļžāļēāļ°āđāļžāļ•āļŠāđŒāļ—āļĩāđˆāđāļāđ‰āđ„āļ‚āļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆ Zero-Day āđāļĨāļ°āļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆāļĒāļāļĢāļ°āļ”āļąāļšāļŠāļīāļ—āļ˜āļīāđŒāđ€āļžāļ·āđˆāļ­āļ›āđ‰āļ­āļ‡āļāļąāļ™āļāļēāļĢāđ‚āļˆāļĄāļ•āļĩāļ—āļĩāđˆāļāļģāļĨāļąāļ‡āđ€āļāļīāļ”āļ‚āļķāđ‰āļ™āđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒ āļ“ āļ‚āļ“āļ°āļ™āļĩāđ‰ āļ™āļ­āļāļˆāļēāļ Microsoft āļĄāļĩāļĢāļēāļĒāļ‡āļēāļ™āļ§āđˆāļēāļœāļđāđ‰āļœāļĨāļīāļ•āļ‹āļ­āļŸāļ•āđŒāđāļ§āļĢāđŒāļ­āļ·āđˆāļ™āđ† āđ€āļŠāđˆāļ™ Adobe, Cisco, Fortinet āđāļĨāļ° Google āļāđ‡āļ­āļ­āļāđāļžāļ•āļŠāđŒāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ€āļ”āļ·āļ­āļ™āđ€āļ”āļĩāļĒāļ§āļāļąāļ™āļ”āđ‰āļ§āļĒ āļ”āļąāļ‡āļ™āļąāđ‰āļ™āļāļēāļĢāļ­āļąāļ›āđ€āļ”āļ•āļĢāļ°āļšāļšāđāļĨāļ°āđāļ­āļ›āļžāļĨāļīāđ€āļ„āļŠāļąāļ™āļ„āļ§āļĢāļ”āļģāđ€āļ™āļīāļ™āđ„āļ›āđāļšāļšāļ„āļĢāļšāļ§āļ‡āļˆāļĢāđ€āļžāļ·āđˆāļ­āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļŠāļđāļ‡āļŠāļļāļ” āļŠāļļāļ”āļ—āđ‰āļēāļĒāļ™āļĩāđ‰ āļœāļĄāđƒāļŠāđ‰āđ€āļ§āļĨāļēāļ•āļīāļ”āļ•āļēāļĄāļ‚āđˆāļēāļ§āļŠāļēāļĢāļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ IT āļ­āļĒāđˆāļēāļ‡āđƒāļāļĨāđ‰āļŠāļīāļ”āđāļĨāļ°āđāļ™āļ°āļ™āļģāļ§āđˆāļēāļœāļđāđ‰āđƒāļŠāđ‰āļ‡āļēāļ™ Windows āļ—āļļāļāļ„āļ™āļ„āļ§āļĢāļĢāļąāļāļĐāļēāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ”āđ‰āļ§āļĒāļāļēāļĢāđ€āļ›āļīāļ”āļĢāļ°āļšāļšāļ­āļąāļ›āđ€āļ”āļ•āļ­āļąāļ•āđ‚āļ™āļĄāļąāļ•āļī āđāļĨāļ°āļ•āļīāļ”āļ•āļēāļĄāļ›āļĢāļ°āļāļēāļĻāļ­āļąāļ›āđ€āļ”āļ•āđāļžāļ•āļŠāđŒāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ­āļĒāđˆāļēāļ‡āļŠāļĄāđˆāļģāđ€āļŠāļĄāļ­ āđ€āļžāļ·āđˆāļ­āđƒāļŦāđ‰āļĢāļ°āļšāļšāļ‚āļ­āļ‡āđ€āļĢāļēāļ›āļĨāļ­āļ”āļ āļąāļĒāļˆāļēāļāļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļĒāļļāļ„āđƒāļŦāļĄāđˆāļ—āļĩāđˆāļ‹āļąāļšāļ‹āđ‰āļ­āļ™āļĄāļēāļāļĒāļīāđˆāļ‡āļ‚āļķāđ‰āļ™āđƒāļ™āļ—āļļāļāļ§āļąāļ™āļ™āļĩāđ‰