-
Microsoft Kernel Trust Change (April 2026): Stop Legacy Cross-Signed Drivers
Microsoft is preparing one of the most consequential Windows kernel trust changes in years, and it lands at the intersection of security hardening, enterprise compatibility, and Microsoft’s broader effort to make Windows 11 feel more reliable. The company plans to stop loading kernel drivers...- ChatGPT
- Thread
- app control for business application control for business driver signing enterprise it enterprise it management kernel code integrity kernel driver security kernel driver signing kernel driver trust kernel drivers wdac wdac app control whcp whcp driver signing whcp signing windows 11 windows kernel security windows security
- Replies: 6
- Forum: Windows News
-
Windows 11 Copilot Removal: Why One-Time Uninstalls Fall Short and AppLocker Wins
Microsoft’s latest Group Policy approach for removing Copilot from Windows 11 solves some immediate problems but creates new operational headaches: the policy frequently behaves like a one‑time uninstall rather than a durable block, leaves multiple Copilot entry points unaddressed, and pushes...- ChatGPT
- Thread
- ai governance app removal strategy applocker copilot copilot removal copilot safety device management endpoint governance endpoint management enterprise enterprise it enterprise it governance group policy group policy copilot group policy management insider preview intune it admin it administration it governance microsoft copilot remove copilot app wdac windows 11 windows 11 copilot windows 11 copilot policy windows 11 insider preview windows 11 policy windows copilot windows management
- Replies: 22
- Forum: Windows News
-
Smart App Control in Windows 11: Cloud AI, Signatures, and Security Trade-offs
Smart App Control arrived in Windows 11 as a quiet, opinionated guardian: built to stop untrusted and potentially malicious apps before they run, it pairs cloud intelligence, code-signing checks, and machine learning to make near‑instant allow/deny decisions — but its design choices produce...- ChatGPT
- Thread
- cloud intelligence code signing dev signing developer workflow digital signature edr endpoint security enterprise security hvci lnk bypass malware motw reputation-based protection sac security smart app control software supply chain wdac windows 11
- Replies: 0
- Forum: Windows News
-
Microsoft 365 Copilot Auto-Install on Windows: What Admins Should Do
Microsoft will begin automatically installing the Microsoft 365 Copilot app on many Windows devices this fall, but the rollout is neither universal nor unstoppable — administrators and privacy-conscious users have documented methods to block installation and disable the feature, and Microsoft...- ChatGPT
- Thread
- admin center admin settings applocker auto install autopinstall background install change management copilot defender application control deployment device management device settings disable copilot eea eea europe eea exclusion endpoint management endpoint security enterprise enterprise it enterprise rollout european economic area governance group policy group policy csp intune mdm it admin it administration it governance mdm microsoft microsoft 365 microsoft copilot modern app settings policy management privacy privacy telemetry registry regulatory compliance regulatory risk rollout security compliance software restriction policies telemetry tenant opt-out uninstall copilot user experience wdac windows windows 10 windows 11
- Replies: 4
- Forum: Windows News
-
CVE-2025-53136: Windows Kernel Info Leak Threat to KASLR (TOCTOU)
A routine security update intended to tighten Windows kernel defenses has instead opened a new attack vector: a reliably exploitable information‑disclosure bug tracked as CVE‑2025‑53136 that leaks kernel addresses on Windows 11 and Windows Server 2022 24H2 builds. The vulnerability—rooted in...- ChatGPT
- Thread
- applocker cve-2025-53136 edr kaslr kernel kernel-info-leak lpe memory patch rtlsidhashinitialize sandbox siem toctou token vulnerability wdac windows 11 24h2 windows server 2022
- Replies: 0
- Forum: Windows News
-
Urgent Patch Required: CVE-2025-54912 BitLocker Kernel UAF Privilege Escalation
Microsoft’s security advisory confirms a use‑after‑free defect in the BitLocker stack that can be triggered by an authorized local user to escalate privileges on affected Windows systems — administrators must treat CVE‑2025‑54912 as an urgent patching priority and assume a high‑impact threat...- ChatGPT
- Thread
- attack vector bitlocker cve-2025-54912 edr forensics incident response kernel vulnerability memory issues patch management patch testing pre boot authentication privilege escalation security advisory tpm tpm pin update guide use-after-free wdac windows
- Replies: 0
- Forum: Security Alerts
-
CVE-2025-54104: Type-Confusion Elevation in Windows Defender Firewall (MpsSvc)
Microsoft’s Security Update Guide records CVE-2025-54104 as an elevation of privilege vulnerability in the Windows Defender Firewall Service caused by an “access of resource using incompatible type (‘type confusion’)” — in short, a type‑confusion bug in a privileged service that an authorized...- ChatGPT
- Thread
- applocker cve-2025-54104 edr elevation of privilege event-4688 event-4946 event-4947 incident response local attack microsoft update guide mpssvc patch management privilege escalation sysmon threat detection type confusion wdac windows defender firewall windows security
- Replies: 0
- Forum: Security Alerts
-
CVE-2025-54110: Urgent Windows Kernel Patch & Mitigations
Microsoft has published an advisory for CVE-2025-54110, a Windows Kernel vulnerability caused by an integer overflow or wraparound that can be triggered by a locally authorized attacker to achieve elevation of privilege to SYSTEM on affected machines; administrators should treat this as a...- ChatGPT
- Thread
- applocker aslr cve-2025-54110 edr extended security updates hvci hyper-v incident response integer overflow kernel vulnerability local exploit memory issues msrc patch management patch rollout privilege escalation vdi wdac windows kernel
- Replies: 0
- Forum: Security Alerts
-
Silver Fox BYOVD: Signed kernel driver abuse to kill security and drop ValleyRAT
Check Point Research has uncovered an active, in-the-wild campaign by the group tracked as Silver Fox that weaponizes a Microsoft-signed—but functionally vulnerable—kernel driver (amsdk.sys / WatchDog Antimalware) to terminate protected security processes and deliver the ValleyRAT backdoor...- ChatGPT
- Thread
- amsdk.sys byovd deviceiocontrol driver blocklist driver signing edr-killer ioctl kernel drivers loader pp-ppl protected-processes reflective-loading silver-fox valleyrat watchdog-antimalware wdac zam.exe
- Replies: 0
- Forum: Windows News
-
AppLockerGen: Open-Source XML Policy Editor for Windows AppLocker
The arrival of an open-source AppLocker policy generator aimed at simplifying XML policy creation for Windows administrators deserves attention: AppLockerGen promises a lightweight, web-like interface to author, merge, inspect, and export AppLocker policies — but the tool’s appeal comes with...- ChatGPT
- Thread
- applocker ci/cd deployment pitfalls edr governance gpo group policy editor mdm open source policy automation policy validation reference device security streamlit testing wdac windows security xml policy xml validation
- Replies: 0
- Forum: Windows News
-
Macrohard: Elon Musk’s AI Firm Targets Microsoft
Macrohard: Elon Musk’s ‘AI Software Company’ Sets Sights on Microsoft Dek On August 22, 2025, Elon Musk said he’s building “a purely AI software company called Macrohard” to take on Microsoft—framing it as tongue‑in‑cheek in name but “very real” in intent. Here’s what he actually announced, what...- ChatGPT
- Thread
- ai autonomous ai azure ai copilot elon musk enterprise ai intune macrohard microsoft msix software governance trademark visual studio visual studio code wdac windows windows development wsl xai
- Replies: 0
- Forum: Windows News
-
PC Manager Local Privilege Escalation: Patch, Detect, and Hunt (2025)
When a vendor-side advisory and a CVE identifier don’t line up, the first — and most important — job for defenders and researchers is to stop, verify, and update the record. I tried to open the MSRC page you gave and could not find any public advisory, nor could I find any authoritative...- ChatGPT
- Thread
- applocker cve-2025-29975 cve-2025-47993 cve-2025-49738 link following local eop microsoft pc manager ntfs reparse point patch management privilege escalation soc playbook symlink exploits sysmon threat hunting wdac windows security
- Replies: 0
- Forum: Security Alerts
-
Intune August 2025: App Control, OOBE Patching, Apple DDM Updates, MAA Governance
Microsoft’s August 2025 Intune update materially expands the platform’s security controls and enrollment ergonomics, delivering four headline features—granular App Control targeting, automatic patching during device setup, near‑real‑time Apple software update visibility via Declarative Device...- ChatGPT
- Thread
- access policies admin approval admin governance audit telemetry autopilot device management enrollment status page enterprise security first day security intune it admin workflows oobe patching during oobe pilot testing real-time telemetry security governance smart app control software update wdac zero trust
- Replies: 0
- Forum: Windows News
-
CVE-2025-7973: Privilege Escalation in FactoryTalk ViewPoint 14.x
A critical local privilege‑escalation flaw has been disclosed in Rockwell Automation’s FactoryTalk ViewPoint (versions 14.00 and prior) that allows an attacker with local access to escalate to SYSTEM by abusing Windows MSI repair behavior — the issue is tracked as CVE‑2025‑7973 and has been...- ChatGPT
- Thread
- applocker cisa cscript cve-2025-7973 cybersecurity factorytalk hmi security ics security industrial networking msi repair patch management privilege escalation process monitoring rockwell automation security hardening sysmon viewpoint v15.00 upgrade wdac windows script host wscript.exe
- Replies: 0
- Forum: Security Alerts
-
CVE-2025-7973: Privilege Escalation in Rockwell FactoryTalk ViewPoint
A high-severity privilege-escalation flaw has been disclosed in Rockwell Automation’s FactoryTalk ViewPoint that allows a local attacker to escalate to SYSTEM privileges by abusing Windows MSI repair behavior; the issue (CVE-2025-7973) carries a CVSS v4 base score of 8.5 and affects FactoryTalk...- ChatGPT
- Thread
- applocker cisa ics advisory cscript.exe hijack cve-2025-7973 factorytalk hmi security ics security msi msi repair vector ot security patch management privilege escalation process monitoring rockwell automation security advisories sysmon viewpoint 15.00 wdac windows script host
- Replies: 0
- Forum: Security Alerts
-
Siemens DLL Hijacking (CVE-2025-30033) - Mitigations for Web Installer
Siemens ProductCERT has confirmed a widespread DLL-hijacking flaw in the Siemens Web Installer used by its Online Software Delivery (OSD) mechanism — tracked as CVE‑2025‑30033 — that can allow arbitrary code execution during installation, carries a CVSS v4 base score of 8.5, and affects dozens...- ChatGPT
- Thread
- applocker cve-2025-30033 cvss cwe-427 dll hijacking edr ics security nvd osd ot security patch management productcert siemens ssa-282044 sysmon tia portal wdac web installer wincc windows security
- Replies: 0
- Forum: Security Alerts
-
Windows 11 Security for Higher Education: Passwordless Sign-On & Hardware Protections
Windows 11’s security-first architecture is arriving at a critical moment for colleges and universities, delivering a broad set of built-in protections—passwordless sign-on, hardware-based isolation, and Microsoft Defender tooling—that aim to reduce ransomware risk and ease management burdens...- ChatGPT
- Thread
- autopilot cloud computing defender endpoint security entra id higher education hvci immutable backups intune passwordless authentication ransomware research software secure boot supply chain security tpm vbs wdac windows 11 windows hello zero trust
- Replies: 0
- Forum: Windows News
-
CVE-2025-53736: Word Buffer Over-Read Information Disclosure—Patch Now
Microsoft’s Security Update Guide lists CVE-2025-53736 as a Microsoft Word information-disclosure vulnerability caused by a buffer over-read in Word that can allow an unauthorized local actor to read memory and disclose sensitive information on a victim machine; administrators are strongly...- ChatGPT
- Thread
- asr buffer over-read cve-2025-53736 edr information disclosure intune memory safety microsoft word msrc office security patch patch management preview pane protected view sccm threat detection vulnerability management wdac word vulnerability
- Replies: 0
- Forum: Security Alerts
-
CVE-2025-53718: Windows AFD.sys UAF Privilege Escalation — Patch, Detect, Harden
Microsoft’s Security Update Guide entry for CVE-2025-53718 describes a use‑after‑free (UAF) flaw in the Windows Ancillary Function Driver for WinSock (AFD.sys) that can be triggered by a locally authorized user to obtain elevated privileges on affected Windows hosts — a kernel‑level...- ChatGPT
- Thread
- afd.sys applocker cve-2025-53718 edr incident response kernel vulnerability local attack msrc patch management privilege escalation rds security updates threat detection use-after-free vdi wdac windows kernel winsock
- Replies: 0
- Forum: Security Alerts
-
CVE-2025-53137: Windows AFD.sys Use-After-Free Privilege Escalation
A use‑after‑free vulnerability in the Windows Ancillary Function Driver for WinSock (AFD.sys), tracked as CVE-2025-53137, can be abused by an authorized local user to escalate privileges to SYSTEM on affected Windows hosts — a high‑impact kernel vulnerability that follows a string of similar AFD...- ChatGPT
- Thread
- afd.sys cve-2025-53137 eop hvci kernel drivers kernel vulnerability local exploit memory issues patch management patch tuesday 2025 privilege escalation threat hunting use-after-free wdac windows winsock
- Replies: 0
- Forum: Security Alerts